Hopefully, you guys have a clean image of your hard drives. Macrium Reflect free is what many computer enthusiasts use.
Macirum Reflect is free
In the one time I had ransomware on a computer that had nothing on it, I called them, and reinstalled my image over the top of them....laughing all the way.
If you’ve got nothing to lose, re-install windows.
Revert to a previous saved image should remove it. You may lose some files.
Non profits are a scam to get big salaries and benefits.; It is a total scam . We all know that. Seek profits!!
A lot of info about this problem.
Firstly, unlike B-HO, the threat must be accurately identified. I think the ACTUAL word is “Cyber”. However, the way you describe it, the word might well be “Gerber”. If it’s the latter, don’t baby it.
People who write ransomware, when caught, should have their intestines pulled out through their mouths.
As an alternative, you can get new hard drives and save the old ones just in case a fix is available in the future. The process is the same - install OS, install software and restore data.
Carbonite has at least three versions of the backup availabe. They also have the capability to do an image backup which is a complete copy of the entire hard drive but this requires a local external drive connected to the PC
When I mean image it is something that the operating system does automatically periodically. System recovery.
Presume that you are running Windows.
Looks like the only alternatives are to pay the ransom or make do with a backup.
You aren’t decrypting it without the key.
IT manager here for a small regional telephone / internet provider. I had one of my techs fall for this same type of thing, I would not even think of paying it only helps them so they can get more victims and how do you know after you give them the bit coins they will not hit you again. What we did was wipe the techs machine and restore the files he had access to. We did lose any changes that were made between when we backed up the night before and when we got infected. The big take away is make sure you have backups also limit the files any one person has access to.
there are a number of free tools (and some online services) that can decrypt cerber encryption:
https://www.google.com/search?q=+Cerber+Ransomware&ie=utf-8&oe=utf-8#q=Cerber+Ransomware+decryptor
Also, if you are lucky enough to still be using Windows 7, right clicking folders and then navigating to properties -> previous versions can bring back the last set of files before you were hit with the ransomware.
sometimes you can go right for high-level folders like My Documents and get everything back. just be sure to use the Copy option and not the Restore option to restore to a separate, new folder, and then manually copy the restored files back to the old folder. You’ll also have to manually delete the encrypted *.cerber files as well.
Using a cerber decrypter tool is the best and easiest way to go, though.
The only answer to this crap is to find and kill the people doing this. This includes whoever the virus refers you to in order to purchase the “fix”.
A decent government would be doing this for us.
I got an early ransomware some years ago when I had never heard of such a thing. I went through every tool in the Windows toolbox and finally called in my son when the popups were making it impossible to access anything at all. He worked the mouse and keyboard for over an hour but he cleared the crap out and loaded Malwarebytes. I haven't had any virus or exploit, at least not one that has interfered with my use of the computer (I'm sure NSA has a continually updated mirror of my hard drive) since then.
Some volunteer clicked on something they shouldn’t have
More than likely not “hacked” but someone was traversing porn sites
If you get one of these, just open the task manager and kill all your web browsers.
EVERY FREEPER SHOULD HAVE AVAST ANTI-VIRUS, MALWAREBYTES, and CCLEANER installed