I have always heard that you don’t get a key. You just lose your money.
The obvious of paying the “ransom” only encourages them and I doubt that the “key” will remove the malware permanently, and that they will keep coming to the well for more $
Had a similar problem with an overseas branch. Never heard of the outcome.
I’m about to the point of running linux live such as Ubuntu for internet stuff and using windoze on line as little as possible.
Other than routine browsing, email, and FTP there is nothing else.
Expensive lesson, but now you've learned it.
“Hitman” worked for the DOJ page-locker. I don’t know about this one.
Massachusetts police department pays $500 CryptoLocker ransom
+1
You have to determine whether reconstructing the data would cost less than paying the ransome and possibly getting nothing in return.
==
Horse-barn door.
Why were backups on the same server(s) as the data files?
Why were servers not backed up/imaged?
==
How did the perps get the malware planted onto the system?
==
Even with my home computers, I have 4 or 5 backups on USB disks for data that is important.
==
Get this: “The FixMeSticks - External hardware-based removal of viruses, spyware, trojans, rootkits and more that cannot be removed by software security programs.”
After, you get rid of the malware, install a Chrome Browser, save your data on a cloud, and buy Chrome Desktops for your people.
Or keep using IE and MScrewu systems and enjoying the thrill.
Tech ping
Tools to recover files... I hope this works for you.
Good luck.
Report this to the FBI
FWIW, the rumor on the grapevine is that these hackers are trying to establish “credibility” by honoring the ransom payment from small companies. The end goal being to extract more lucrative payments from bigger companies as they establish a reputation.
So, yeah, they’ll probably give you a key because your company is likely not the end game.
Sorry. Just read your post again.
It is the company’s network and worth the risk? Yes. It’s their money and they should have taken precautions with their IT department to protect the servers. And having no offsite back up is something any IT tech should have done.
I have a relative who got an early version of that. That was the one that had a fix for it. If you have that one, then you will be able to freely unlock your files.
http://www.itproportal.com/2014/08/06/a-cryptolocker-cure-has-finally-landed-—and-its-free/
If it is not this specific version, then you are out of luck.
Some people pay and don’t get the fix, while others do.
If you pay, you help criminals hurt others.
My condolences. Out of curiousity and caution, what version of Windows were you running? Was it up to date with patches? What was your virus scanner, if any?
These are valid questions, because if you either pay or somehow recover the files, you don’t want to e vulnerable to a re-occurrence.
Go to this section and follow the directions:
How to prevent your computer from becoming infected by CryptoLocker
I would never pay.
Did you try an old restore point ?