?
Solved

cryptolocker in a desktop

Posted on 2016-08-04
3
Medium Priority
?
122 Views
Last Modified: 2016-08-22
One of my of my user was infect with Cryptolocker and encrypt some share folder in the server,  my question is I need to restore the server because 3 of the 10 folder there was encrypt or We are safe if just remove those files and put the backup of those 3 folders?


which is the best option?
0
Comment
Question by:PLCITS
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 36

Assisted Solution

by:Kimputer
Kimputer earned 1000 total points
ID: 41742559
Yes you are safe if you restore from backup, IF YOU FOUND the malware and removed it. If not, more files could be next.
0
 

Assisted Solution

by:PLCITS
PLCITS earned 0 total points
ID: 41742628
So I can just restores those 3 folder right?
0
 
LVL 29

Accepted Solution

by:
Thomas Zucker-Scharff earned 1000 total points
ID: 41742670
yes, you can just restore those folders, but be sure, as kimputer mentioned, that there are NO other files encrypted.  Also make sure that the computer that was the initial cause has been sufficiently cleaned/reimaged and that no other computer has been affected.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
The conference as a whole was very interesting, although if one has to make a choice between this one and some others, you may want to check out the others.  This conference is aimed mainly at government agencies.  So it addresses the various compli…
This tutorial will walk an individual through locating and launching the BEUtility application to properly change the service account username and\or password in situation where it may be necessary or where the password has been inadvertently change…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question