Solved

Virus .zepto files

Posted on 2016-09-22
10
40 Views
Last Modified: 2016-10-27
Hi, We found Virus in our shared folders following files.
 .zepto

If i didn't remove this file any harm?  i mean if i leave the file without delete.
0
Comment
Question by:ukerandi
  • 4
  • 3
  • 2
10 Comments
 
LVL 18

Assisted Solution

by:hopeleonie
hopeleonie earned 250 total points
Comment Utility
No they will not harm. These files are encrypted and i recommend you to delete them all. Hope you have a valid backup to restore?
Did you clean, reimage or reinstall the infection source?
0
 
LVL 32

Accepted Solution

by:
Stefan Hoffmann earned 250 total points
Comment Utility
This normally means:

Some client machines are/were infected.
This clients have encrypted data files and removed the original data.

Step 1) Find the infected machines and clean them.
Step 2) Check your backups whether the original files are covered by your backup.
Step 3) Restore the files from your backup.
Step 4) Now you can delete those files.
0
 
LVL 10

Author Comment

by:ukerandi
Comment Utility
But IT Technical Department said,it's ok leave no need to delete.
0
 
LVL 18

Expert Comment

by:hopeleonie
Comment Utility
@ukerandi

LOL :-)
1
Free camera licenses with purchase of My Cloud NAS

Milestone Arcus software is compatible with thousands of industry-leading cameras for added flexibility. Upon installation on your My Cloud NAS, you will receive two (2) camera licenses already enabled in the software. And for a limited time, get additional camera licenses FREE.

 
LVL 10

Author Comment

by:ukerandi
Comment Utility
yes i knew ,if you can give me a reason why we need to delete?
0
 
LVL 32

Expert Comment

by:Stefan Hoffmann
Comment Utility
Cause it is unusable for you, as long as you don't pay the ransom.
0
 
LVL 18

Expert Comment

by:hopeleonie
Comment Utility
As ste5an told the files are unusable and will just fill the space. :-)
0
 
LVL 10

Author Comment

by:ukerandi
Comment Utility
thx
0
 
LVL 10

Author Closing Comment

by:ukerandi
Comment Utility
ok
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Operating system developers such as Microsoft (https://www.microsoft.com) and Apple have made incredible strides in virus protection over the past decade. Operating systems come packaged with built in defensive tools such as virus protection and a f…
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now