Solved

Virus .zepto files

Posted on 2016-09-22
10
96 Views
Last Modified: 2016-10-27
Hi, We found Virus in our shared folders following files.
 .zepto

If i didn't remove this file any harm?  i mean if i leave the file without delete.
0
Comment
Question by:ukerandi
  • 4
  • 3
  • 2
10 Comments
 
LVL 19

Assisted Solution

by:*** Hopeleonie ***
*** Hopeleonie *** earned 250 total points
ID: 41810264
No they will not harm. These files are encrypted and i recommend you to delete them all. Hope you have a valid backup to restore?
Did you clean, reimage or reinstall the infection source?
0
 
LVL 33

Accepted Solution

by:
ste5an earned 250 total points
ID: 41810267
This normally means:

Some client machines are/were infected.
This clients have encrypted data files and removed the original data.

Step 1) Find the infected machines and clean them.
Step 2) Check your backups whether the original files are covered by your backup.
Step 3) Restore the files from your backup.
Step 4) Now you can delete those files.
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810422
But IT Technical Department said,it's ok leave no need to delete.
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810485
@ukerandi

LOL :-)
1
 
LVL 10

Author Comment

by:ukerandi
ID: 41810728
yes i knew ,if you can give me a reason why we need to delete?
0
 
LVL 33

Expert Comment

by:ste5an
ID: 41810732
Cause it is unusable for you, as long as you don't pay the ransom.
0
 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810803
As ste5an told the files are unusable and will just fill the space. :-)
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810911
thx
0
 
LVL 10

Author Closing Comment

by:ukerandi
ID: 41863162
ok
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question