Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Virus .zepto files

Posted on 2016-09-22
10
Medium Priority
?
132 Views
Last Modified: 2016-10-27
Hi, We found Virus in our shared folders following files.
 .zepto

If i didn't remove this file any harm?  i mean if i leave the file without delete.
0
Comment
Question by:ukerandi
  • 4
  • 3
  • 2
10 Comments
 
LVL 19

Assisted Solution

by:*** Hopeleonie ***
*** Hopeleonie *** earned 1000 total points
ID: 41810264
No they will not harm. These files are encrypted and i recommend you to delete them all. Hope you have a valid backup to restore?
Did you clean, reimage or reinstall the infection source?
0
 
LVL 36

Accepted Solution

by:
ste5an earned 1000 total points
ID: 41810267
This normally means:

Some client machines are/were infected.
This clients have encrypted data files and removed the original data.

Step 1) Find the infected machines and clean them.
Step 2) Check your backups whether the original files are covered by your backup.
Step 3) Restore the files from your backup.
Step 4) Now you can delete those files.
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810422
But IT Technical Department said,it's ok leave no need to delete.
0
Choose an Exciting Career in Cybersecurity

Help prevent cyber-threats and provide solutions to safeguard our global digital economy. Earn your MS in Cybersecurity. WGU’s MSCSIA degree program was designed in collaboration with national intelligence organizations and IT industry leaders.

 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810485
@ukerandi

LOL :-)
1
 
LVL 10

Author Comment

by:ukerandi
ID: 41810728
yes i knew ,if you can give me a reason why we need to delete?
0
 
LVL 36

Expert Comment

by:ste5an
ID: 41810732
Cause it is unusable for you, as long as you don't pay the ransom.
0
 
LVL 19

Expert Comment

by:*** Hopeleonie ***
ID: 41810803
As ste5an told the files are unusable and will just fill the space. :-)
0
 
LVL 10

Author Comment

by:ukerandi
ID: 41810911
thx
0
 
LVL 10

Author Closing Comment

by:ukerandi
ID: 41863162
ok
0

Featured Post

Configuration Guide and Best Practices

Read the guide to learn how to orchestrate Data ONTAP, create application-consistent backups and enable fast recovery from NetApp storage snapshots. Version 9.5 also contains performance and scalability enhancements to meet the needs of the largest enterprise environments.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
How does someone stay on the right and legal side of the hacking world?
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

926 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question