Solved

Zepto virus

Posted on 2016-08-20
12
97 Views
Last Modified: 2016-09-10
My win10 PC is a victim of the Zepto virus. I have run Spyhunter[ but my files are still encrypted. Is there a program I can  use to restore my files?

I have tried System Restore which is not working although it is configured correctly..

I have tried to use Shadow Explorer but nothing shows I the program user interface.
0
Comment
Question by:bledington
  • 3
  • 2
  • 2
  • +3
12 Comments
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 125 total points (awarded by participants)
ID: 41763816
No. No way. You MUST restore from backup and if no backup your files are lost.
1
 
LVL 9

Assisted Solution

by:bas2754
bas2754 earned 125 total points (awarded by participants)
ID: 41763826
Unforunately, unlike Locky, the Zepto virus does not have a recovery tool available as of yet.  If you had any kind of backup enabled or Shadow Copies enabled on your system then you should be able to recover the files that way, however if not outside of paying the ransom and hoping that the decrypt works, these files are not recoverable.
1
 
LVL 87

Accepted Solution

by:
rindi earned 125 total points (awarded by participants)
ID: 41763859
First do a clean installation of Windows to make sure the virus is gone. Then make sure you create and only use a local user account, and not an account with admin rights. Install a good AV tool like Panda Free AV if this is a private PC, get all windows updates.

When done, as mentioned above, restore your data from your backups.
1
 
LVL 78

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 125 total points (awarded by participants)
ID: 41763899
As for all ransom ware the only solution is to have a recent offline backup to restore files from
1
 
LVL 87

Expert Comment

by:rindi
ID: 41763909
It's not just for ransomware. Any data that is of any importance must be backed up, and not just once to one media. Backups are the most important part of computer use. Anything can go wrong or break. The disk, the PC, viruses, human error etc.
0
Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

 
LVL 90

Expert Comment

by:John Hurst
ID: 41763922
Why did you accept only one solution of the many here that said your data was lost and you need to back up?
1
 

Author Comment

by:bledington
ID: 41764212
Sorry that was my fault I pressed the wrong button. Can I start over again
0
 

Author Comment

by:bledington
ID: 41765093
The answers are all best solutions what do I do please
0
 
LVL 87

Expert Comment

by:rindi
ID: 41765149
You can select more than one comment.
0
 
LVL 51

Expert Comment

by:Joe Winograd, EE MVE
ID: 41765350
Here's a Help article explaining how to split points by accepting multiple comments:
http://support.experts-exchange.com/customer/portal/articles/608596-how-do-i-accept-multiple-comments-as-my-solution-?b_id=44

Regards, Joe
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
My experience with Windows 10 over a one year period and suggestions for smooth operation
Windows 8 comes with a dramatically different user interface known as Metro. Notably missing from the new interface is a Start button and Start Menu. Many users do not like it, much preferring the interface of earlier versions — Windows 7, Windows X…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now