Solved

Virus .zepto files

Posted on 2016-09-22
10
109 Views
Last Modified: 2016-10-27
Hi, We found Virus in our shared folders following files.
 .zepto

If i didn't remove this file any harm?  i mean if i leave the file without delete.
0
Comment
Question by:ukerandi
  • 4
  • 3
  • 2
10 Comments
 
LVL 19

Assisted Solution

by:*** Hopeleonie ***
*** Hopeleonie *** earned 250 total points
ID: 41810264
No they will not harm. These files are encrypted and i recommend you to delete them all. Hope you have a valid backup to restore?
Did you clean, reimage or reinstall the infection source?
0
 
LVL 33

Accepted Solution

by:
ste5an earned 250 total points
ID: 41810267
This normally means:

Some client machines are/were infected.
This clients have encrypted data files and removed the original data.

Step 1) Find the infected machines and clean them.
Step 2) Check your backups whether the original files are covered by your backup.
Step 3) Restore the files from your backup.
Step 4) Now you can delete those files.
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810422
But IT Technical Department said,it's ok leave no need to delete.
0
Watch Anatomy of a Wi-Fi Hack On-Demand

In less than a weekend, anyone with Internet access and some free time can become a Wi-Fi MitM to wreak havoc on your network. View our Wi-Fi Expert in an on-demand episode of our Secure Wi-Fi mini-series as he explores the motives, execution, and anatomy of a Wi-Fi hack.

 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810485
@ukerandi

LOL :-)
1
 
LVL 10

Author Comment

by:ukerandi
ID: 41810728
yes i knew ,if you can give me a reason why we need to delete?
0
 
LVL 33

Expert Comment

by:ste5an
ID: 41810732
Cause it is unusable for you, as long as you don't pay the ransom.
0
 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810803
As ste5an told the files are unusable and will just fill the space. :-)
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810911
thx
0
 
LVL 10

Author Closing Comment

by:ukerandi
ID: 41863162
ok
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Are you ready to implement Active Directory best practices without reading 300+ pages? You're in luck. In this webinar hosted by Skyport Systems, you gain insight into Microsoft's latest comprehensive guide, with tips on the best and easiest way…

735 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question