Solved

Decrypt.zepto file

Posted on 2016-09-13
3
19 Views
Last Modified: 2016-09-14
Hi,
    My systems was effected with zepto ransomeware.
     After scanning with malware bytes ransomeware gone but I am unable decrypt zepto file back

Can any one have solution

Thanks in advance
0
Comment
Question by:Mrrams77
3 Comments
 
LVL 9

Assisted Solution

by:Tomas Valenta
Tomas Valenta earned 167 total points
ID: 41797371
There is only one solution - removing of virus and restoring data from backup.
0
 
LVL 16

Assisted Solution

by:Malmensa
Malmensa earned 167 total points
ID: 41797404
If you have no backups, about the only solution would be to pay the criminals and hope they deliver. They might, but of course, if they do that, they will be encouraged to try the same again.
0
 
LVL 5

Accepted Solution

by:
efrimpol earned 166 total points
ID: 41798028
It the files are too valuable or too important (bank documents, tax info, etc.) that you absolutely must  have, then you may want to pay the ransom. But there is no guarantee that you won't get infected again and be forced to pay again.

But I'm from the school that you don't pay thieves, who then use your money to make themselves stronger.

If you don't have a backup of your files stored somewhere that is not on your system (usb flash or external drive) and they can be considered a loss, then the preferred method is to wipe the system and reinstall fresh.

"Fool me once, shame on you. Fool me twice, shame on me."
0

Featured Post

How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

Join & Write a Comment

UPDATE - 6/15/2011 Added support for Release Update 6 Maintenance Patch 2 Point Patch 1 (RU6 MP2 PP1). Fixed a defect in the username field that was hard-coded to look for a specific domain (left over code from testing). This release will be the …
Most PC repair technicians (if not all) always start their cleanup process by emptying the temp folders before running any removal tools. It makes sense because temp folders are common places for malware installers to lurk and removing all the junk …
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now