ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    File server got affected by .micro

    IT Discussion
    teslacrypt ransomware malware security
    5
    16
    3.3k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • ChrisJC
      ChrisJ
      last edited by

      I have cleaned malware, but never on a file server, or any other server in this respect. A pc, for repair, a compromised system hdd recovered, reimaged, but old image restored on another for inspection. There are so many hiding spaces even pc's are never trusted again after infection. Opening svchost's and other running processes never takes you to the process that is timed to show itself, and shut down. Searching every entry in even one process is a daunting task. Reliance on software to ferret out all the areas of attack implies the software can and will be ready for the zero day attack, the attackers have most if not all the tools we have to write code that gets around the products. You may stare a Microsoft entry in the face with no clue of it's true task - the many registry entry's, dll's, etc. Man I miss DOS.

      1 Reply Last reply Reply Quote 2
      • ChrisJC
        ChrisJ
        last edited by

        Also to make sure the Backup is clean, that this is not something that has been a hidden but now 'discovered' process that has been running for weeks. Backup can be compromised. Most malware is considered a failure if it is detected, or on the other hand, needs to be detected for ransom, or just outright malice.

        1 Reply Last reply Reply Quote 2
        • RoopanKumarR
          RoopanKumar
          last edited by

          Bad thing is that we they dint have any backup of that server.
          So am letting you to give any solution, one of my colleague is suffering with this.

          scottalanmillerS 1 Reply Last reply Reply Quote 0
          • scottalanmillerS
            scottalanmiller @RoopanKumar
            last edited by

            @RoopanKumar said:

            Bad thing is that we they dint have any backup of that server.
            So am letting you to give any solution, one of my colleague is suffering with this.

            You can attempt the decryption methods, no harm in trying but there are three accepted solutions to ransomware:

            • Pay the ransom as requested
            • Do nothing, the data is lost
            • Restore from back <- not an option here

            Given that the data was not important enough to back up, one can only assume it is not important enough to pay the ransom either. So my guess is that the desired thing is to do nothing and the data is just gone.

            RoopanKumarR 1 Reply Last reply Reply Quote 2
            • RoopanKumarR
              RoopanKumar @scottalanmiller
              last edited by

              @scottalanmiller I have suggested the same but we dont know who he need to pay for ransom too.

              The data lost is lost but they needed so i came up here to find anything or anyway for it

              scottalanmillerS 2 Replies Last reply Reply Quote 0
              • scottalanmillerS
                scottalanmiller @RoopanKumar
                last edited by

                @RoopanKumar said:

                @scottalanmiller I have suggested the same but we dont know who he need to pay for ransom too.

                The TeslaCrypt malware should have told you whom to pay when it informed you that it had your files. If it did not, I doubt that there is any means of finding out.

                1 Reply Last reply Reply Quote 1
                • scottalanmillerS
                  scottalanmiller @RoopanKumar
                  last edited by

                  @RoopanKumar said:

                  The data lost is lost but they needed so i came up here to find anything or anyway for it

                  Sadly, I don't mean lost like "they are not sure where it is", it is lost like .... it is gone. Unless they can use those decryption methods and get the files back that way, which is unreliable and slow, then there is nothing to be done.

                  If there was a way to get the files back, ransomware would not be worthwhile. The reality is, it is extremely effective.

                  1 Reply Last reply Reply Quote 1
                  • Reid CooperR
                    Reid Cooper
                    last edited by

                    Cisco talks about this tool having success. Download this open source decrypter from GitHub and see if it is able to access the files:

                    https://github.com/vrtadmin/TeslaDecrypt/blob/master/Windows/TeslaDecrypter.exe

                    RoopanKumarR 1 Reply Last reply Reply Quote 2
                    • scottalanmillerS
                      scottalanmiller
                      last edited by

                      That looks like a decent tool. If Cisco recommends it, definitely worth trying.

                      My guess is that the decryption process will be slow. Has anyone tested this tool yet?

                      1 Reply Last reply Reply Quote 0
                      • RoopanKumarR
                        RoopanKumar @Reid Cooper
                        last edited by

                        @Reid-Cooper do have any documents for the steps to be taken or how this works. So i will recommended to download and check with it.

                        1 Reply Last reply Reply Quote 0
                        • 1 / 1
                        • First post
                          Last post