Solved

how to decrypt zepto files

Posted on 2016-07-19
3
2,446 Views
Last Modified: 2016-07-20
zepto virus created zepto encrypted files. How to decrypt them?
0
Comment
Question by:wendellpayne
3 Comments
 
LVL 11

Expert Comment

by:Old User
ID: 41719949
You can't without paying the ransome, this is never advised as there is still no guarantee and it just encourages further use of these viruses.

You need to rebuild your PC, laptop, server and restore the data from a back up.
0
 
LVL 20

Accepted Solution

by:
Russ Suter earned 500 total points
ID: 41719989
The Zepto ransomware is a variant of Locky. It uses AES-256 asymmetric encryption, the strongest known encryption at this time. Brute force is the only known vulnerability and this approach is estimated to take hundreds of years on an AES-256 encryption model using currently available hardware.

Depending on how far the virus got before you stopped it you might be able to recover some files from shadow copies using Shadow Explorer. http://www.shadowexplorer.com/

Barring that your only option is to recover your data from a recent backup.

There are several online guides that tell you how to remove the ransomware but I tend not to bother with those. The best way to be 100% certain that the virus is gone is to reformat your hard drive and install a fresh OS and applications.
0
 
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
ID: 41720067
AES 256bit encryption can be brute forced but it would take ~6.7 x 10e254 tines the life of the universe to decrypt half the key space.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
When the confidentiality and security of your data is a must, trust the highly encrypted cloud fax portfolio used by 12 million businesses worldwide, including nearly half of the Fortune 500.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now