the ransoms are relatively cheap if youre not a targeted corportation,
running between 150 and 8The amount of work stoppage and time investment
alot of people put into this exceeds the ransom anyway

On Fri, Sep 30, 2016 at 8:42 AM, Ken Hohhof <[email protected]> wrote:

> FireEye was providing a decrypt tool for the original Cryptolocker but
> likely you are out of luck.  Find a backup, pay the ransom, or kiss your
> data goodbye.
>
>
>
> *From:* Af [mailto:[email protected]] *On Behalf Of *Jason McKemie
> *Sent:* Friday, September 30, 2016 1:26 AM
> *To:* [email protected]
> *Subject:* Re: [AFMUG] OT: Ransomware
>
>
>
> Depends on the ransomware.  I found a decryption tool for my mom's
> computer when she managed to get it infected - depends on the particular
> flavor I'm sure.  I think this one had .crypt or .crypted extensions on all
> the files.  I did need an copy of one of the encrypted files prior to the
> infection for the program to do its job though.
>
>
>
> On Fri, Sep 30, 2016 at 12:14 AM, Travis Johnson <[email protected]> wrote:
>
> Hi,
>
> One of our office computers was just infected with "ransomware". It has
> encrypted all the files on that computer, plus many files on a server that
> computer was connected to.
>
> Any ideas or suggestions on the best way to try and fix/remove this crap
> and unencrypt all the files?
>
> Travis
>
>
>



-- 
If you only see yourself as part of the team but you don't see your team as
part of yourself you have already failed as part of the team.

Reply via email to