This is a great time to reinforce the need to do backups. Since it's a sensitive thing - you need to judge how to deliver the news but it's critical. Now more than ever before.

Couple of things. I'd save the data - LATER you might be able to get the drive unlocked. Don't allow them to waste the money on the unlock. The way I understand it, it's infrequent that they actually unlock it. In fact, by now the point at which they could be contacted might have been already shut down or compromised (more likely) by other 'hackers'. Just do not give in to paying. Better to wait. JMHO.

I got lucky with a client that got hit with this, about a year earlier I really was adamant that they get into some sort of automated backup. They took an online (sorry, CLOUD) backup that I was able to resell. It paid for itself FOUR times over (so far)! Anyway, sorry for you & client


On 7/18/2018 3:00 PM, Thane K. Sherrington wrote:
I know someone with no backups who recently had his entire computer encrypted with the .arrow variant of Dharma (.cezar Family).  (BTW, this isn't me.)

There is apparently no way to decrypt without paying the ransom or recovering deleted files.

So two questions:

1)Does anyone know if the ransomware encryption encrypts the file to a new file, then deletes the old one (giving me the possibility of deleted file recovery)?  If so, what software is recommend for an Windows NTFS system (so far, Recuva and R-Studio have found squat).

2)If he decides to pay the ransom and take his chances, what are legit sites to purchase bitcoin (never done that before)?

T



Reply via email to