Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


1 posted on 01/02/2017 6:41:30 PM PST by GYPSY286
[ Post Reply | Private Reply | View Replies ]


Navigation: use the links below to view more comments.
first previous 1-2021-27 last
To: GYPSY286

The same thing you would do if the hard drive just died. Paying the ransom does not ensure you will get the key.


39 posted on 01/03/2017 6:44:26 AM PST by AppyPappy (If you really want to irritate someone, point out something obvious they are trying hard to ignore.)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: GYPSY286

Many modern ransomware attacks are present in a network for an extended period prior to execution. This ensures that even the backups have a copy of the ransomware tucked away somewhere. If you don’t have regular backups, there’s really nothing you can do outside of paying the ransom.

If you have any server operating systems in your environment, follow published hardening guides, and use the built-in backup utilities (Rsync for Linux, Windows Backup for Windows). Windows Desktops can use Folder History, System Restore, or even wbadmin if they’re stored on replicated network storage. Otherwise, the workstations are likely unrecoverable.

The most you can hope for is to store the infected disks away in a locked cabinet on the off chance that the criminal ring is caught and the decryption key is published.


40 posted on 01/03/2017 6:45:38 AM PST by rarestia (Repeal the 17th Amendment and ratify Article the First to give the power back to the people!)
[ Post Reply | Private Reply | To 1 | View Replies ]

bfl


43 posted on 01/03/2017 6:54:24 AM PST by DoodleDawg
[ Post Reply | Private Reply | To 1 | View Replies ]

To: GYPSY286
You question lacks many details which are needed for more precise answers.

Did you do a complete drive back up, or at least company (versus system) files?

Do you have a restore disk for your operating system?

Where are the back ups located?

47 posted on 01/03/2017 8:10:51 AM PST by daniel1212 ( Turn to the Lord Jesus as a damned and destitute sinner+ trust Him to save you, then follow Him!)
[ Post Reply | Private Reply | To 1 | View Replies ]

To: GYPSY286

My company is attacked by cryptolocker all the time. We’re an enterprise with 2000+ PC’s though. We fortunately have daily commvault backups and snapshots taken multiple times a day. We can quickly restore the network file locations from earlier backups. We end up just re-imaging the actual PC though to get rid of it.


50 posted on 01/03/2017 9:53:20 AM PST by miliantnutcase
[ Post Reply | Private Reply | To 1 | View Replies ]

To: GYPSY286

Get malwarebytes for the next time.
They say they can stop ransomware.
https://www.malwarebytes.com/premium
“Four layers of malware-crushing tech. Smarter detection. Specialized ransomware protection”.


54 posted on 01/03/2017 12:56:32 PM PST by minnesota_bound
[ Post Reply | Private Reply | To 1 | View Replies ]

To: GYPSY286

Hoepfully, you backed up all your files somewhere, so that you can presumably either format your hard drive or replace it, then load the unencrypted files back onto it.


56 posted on 01/03/2017 5:13:38 PM PST by Tolerance Sucks Rocks (Hey, New Delhi! What the hell were you thinking???)
[ Post Reply | Private Reply | To 1 | View Replies ]


Navigation: use the links below to view more comments.
first previous 1-2021-27 last

Free Republic
Browse · Search
Bloggers & Personal
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson