ZEPTO Ransomware - Removal

Posted on 2017-04-11
Last Modified: 2017-04-19
I have a question for about .zepto which I think is a Ransomware virus that change a punch of Pictures on someones computer to .ZEPTO and gives them an IE icon.  I was a bit surprised because I run Deep Freeze on this persons system locking the OS C: Drive partition and having all data on the 2nd partition which is the F: drive.  I installed and ran Kaspersky but it came up 100% clean.  Any ideas?
Question by:Erika Koelle
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
  • 2
  • 2
  • +1
LVL 14

Expert Comment

ID: 42088587
Yes it is a Crypto locker virus. It uses AES-256 asymmetric encryption which is the most powerful encryption.
if your machine is infected, only restore from backup can return back the data.

you can remove Zepto virus with Malwarebytes Anti-Malware Free but you can't decrypt those data back.
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
ID: 42088759
If you are running deepfreeze, and are using best practice (local user is a standard user and you enforce POLP), you should be able to just reboot the machine to go to last image of setup.

Author Comment

by:Erika Koelle
ID: 42088826
Thanks for letting me know I need to restore from backup.  Deep Freeze managed to keep the C: drive partition from staying infected with a reboot, but the data files on the F: drive partition are not protected by Deep Freeze.
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

LVL 63

Expert Comment

ID: 42089059
The ransomware only target the users' document and it can be in any partition including mapped drive. You can try idransomware to confirm the ransom family which may reveal a decryptor tool. Check your other mapped drive to scan through for any encrypted files.

The best solution for dealing with encrypted data is to restore from backups. Better to do a clean slate like reverting ro original state but we will want to make sure the Ransomware is not in the drive or from server, can disconnect and revert back.

AV not necessarily can detect. Zepto contains very good obfuscation for html help files that are created inside every folder with encrypted files. These help files explain how victims’ can pay the ransom and decrypt their files and they are obfuscated to avoid AV detections or detections based on dynamic analysis systems and sandboxes.

In case you need faq on Ransomware, you can catch below too.
LVL 26

Expert Comment

by:Thomas Zucker-Scharff
ID: 42089861

Is the F drive your designated unfrozen zone?  What I do on our public computers with deepfreeze on them is backup the unfrozen portion nightly (during a scheduled unfrozen time in which only the backup and windows update have permission to run).

Author Comment

by:Erika Koelle
ID: 42089869
Correct...the F: partition is the unfrozen zone on a users PC.  The user isn't that sophisticated, so in hind site it probably would have been a good idea to set a Windows backup job to do a daily, weekly, monthly backup of the F: drive data.
LVL 63

Accepted Solution

btan earned 500 total points
ID: 42090181
just an advice is backup should be offline from the client machine once it completed the backup otherwise the infected machine can still get those backup encrypted too. Otherwise back to rebuilding the machine for clean slate to start fresh to avoid recurrence, and consider installing ant-ransomware to augment AV. Include MalwareBytes Anti-Ransomware or Winpatrol WinRansom. Applocker if available is a good means to reduce the exposure as application whitelisted can run only.

Author Closing Comment

by:Erika Koelle
ID: 42099367
Wiping out data files and restoring Pics if available from camera.

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Choosing an appropriate provider for your company’s email security can be difficult as email security is a key element in the overall security of a business. A company’s email is an open door for malicious hackers who can potentially drive your busi…
Ransomware continues to grow in reach and sophistication, putting data everywhere at risk. Learn how to avoid being caught in its sinister clutches with these 11 key tips.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
A company’s greatest vulnerability is their email. CEO fraud, ransomware and spear phishing attacks are the no1 threat to a company’s security. Cybercrime is responsible for the largest loss of money to companies today with losses projected to r…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question