I had a friend of mine with a very small company and a Windows SBS 2011 server that got hit with ransomware. Her backup drive was also taken out by the attack. I was able to help her get a new server up with Windows 2019; however, it would be helpful if we could get her old files back. I see utilities from McAfee and others that may unencrypt, but I know knowing about them. We also have the backup drive and thought about sending that off to be recovered. Any ideas would be appreciated. The suffix on all the files is U8E598.
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
Because of the nature of their business, it may not be a disaster; however, for my company it would be. I have four Windows 2019 servers and will have cloud backup setup before the week is over! Any suggestions on which company to use for cloud backup. We have between 1.5 and 2 tb of data on the servers.
arnold
how much data and the issue with a cloud deals with the agent and there are some that attack the agent in infect/delete the cloud backup.
Dr.Klahn's a backup offline/rotating.......
Look at backups that provide versioning. idrive is decent, but cost for such might be..
look at s3 glaciar option.
for speed get a UDB external and backup the data then disconnect the external. ...
clyde30152
ASKER
Thanks. Does anyone know anything about the AKO ransom? That appears to what have hit my friend's server/
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
Spyhunter is seen discussed as able to remove the also from the system.
There is a reference if you search ako ransomeware, there is a decryptor.....
Make sure to test by working on a copy, image of encrypted data
serialband
Load your files for identification to see if there's an identification. Once it's identified, you can then attempt to track down the decryptor. https://id-ransomware.malwarehunterteam.com/
I saw those links on AKO. There was a local backup, but the backup drive which was using Microsoft Backup, was reformatted. I'm wondering if Ontrack could get the backup back. I may suggest that.
Unlimited question asking, solutions, articles and more.
arnold
reformatted deep or quick? by whom and when? You could try GETDATABACKNT or you can use ontrack free download to scan the drive and see whether it can recover the data.