the ransoms are relatively cheap if youre not a targeted corportation, running between 150 and 8The amount of work stoppage and time investment alot of people put into this exceeds the ransom anyway
On Fri, Sep 30, 2016 at 8:42 AM, Ken Hohhof <[email protected]> wrote: > FireEye was providing a decrypt tool for the original Cryptolocker but > likely you are out of luck. Find a backup, pay the ransom, or kiss your > data goodbye. > > > > *From:* Af [mailto:[email protected]] *On Behalf Of *Jason McKemie > *Sent:* Friday, September 30, 2016 1:26 AM > *To:* [email protected] > *Subject:* Re: [AFMUG] OT: Ransomware > > > > Depends on the ransomware. I found a decryption tool for my mom's > computer when she managed to get it infected - depends on the particular > flavor I'm sure. I think this one had .crypt or .crypted extensions on all > the files. I did need an copy of one of the encrypted files prior to the > infection for the program to do its job though. > > > > On Fri, Sep 30, 2016 at 12:14 AM, Travis Johnson <[email protected]> wrote: > > Hi, > > One of our office computers was just infected with "ransomware". It has > encrypted all the files on that computer, plus many files on a server that > computer was connected to. > > Any ideas or suggestions on the best way to try and fix/remove this crap > and unencrypt all the files? > > Travis > > > -- If you only see yourself as part of the team but you don't see your team as part of yourself you have already failed as part of the team.
