Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Virus .zepto files

Posted on 2016-09-22
10
Medium Priority
?
126 Views
Last Modified: 2016-10-27
Hi, We found Virus in our shared folders following files.
 .zepto

If i didn't remove this file any harm?  i mean if i leave the file without delete.
0
Comment
Question by:ukerandi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
10 Comments
 
LVL 19

Assisted Solution

by:*** Hopeleonie ***
*** Hopeleonie *** earned 1000 total points
ID: 41810264
No they will not harm. These files are encrypted and i recommend you to delete them all. Hope you have a valid backup to restore?
Did you clean, reimage or reinstall the infection source?
0
 
LVL 35

Accepted Solution

by:
ste5an earned 1000 total points
ID: 41810267
This normally means:

Some client machines are/were infected.
This clients have encrypted data files and removed the original data.

Step 1) Find the infected machines and clean them.
Step 2) Check your backups whether the original files are covered by your backup.
Step 3) Restore the files from your backup.
Step 4) Now you can delete those files.
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810422
But IT Technical Department said,it's ok leave no need to delete.
0
Supports up to 4K resolution!

The VS192 2-Port 4K DisplayPort Splitter is perfect for anyone who needs to send one source of DisplayPort high definition video to two or four DisplayPort displays. The VS192 can split and also expand DisplayPort audio/video signal on two or four DisplayPort monitors.

 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810485
@ukerandi

LOL :-)
1
 
LVL 10

Author Comment

by:ukerandi
ID: 41810728
yes i knew ,if you can give me a reason why we need to delete?
0
 
LVL 35

Expert Comment

by:ste5an
ID: 41810732
Cause it is unusable for you, as long as you don't pay the ransom.
0
 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810803
As ste5an told the files are unusable and will just fill the space. :-)
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810911
thx
0
 
LVL 10

Author Closing Comment

by:ukerandi
ID: 41863162
ok
0

Featured Post

Moving data to the cloud? Find out if you’re ready

Before moving to the cloud, it is important to carefully define your db needs, plan for the migration & understand prod. environment. This wp explains how to define what you need from a cloud provider, plan for the migration & what putting a cloud solution into practice entails.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question