This past week a form of cryptolocker ransomware called Teslacrypt infected a work computer or two and infected a shared network hard drive. A lot of the files on the shared network hard drive and some on one of the computers has a ".ecc" file extension. The Teslacrypt private key will be destroyed at a certain time tomorrow morning.
I'll find out more later on if we had backups of the files that were changed to .ecc, but for now I don't know.
I have a few questions if anyone is able to help:
1) Does anyone have any advice on fixing this issue and getting the files back to a normal extension without any infection?
2) Also, after the private key is destroyed, does anyone know if the files can still be decrypted?
3) Can we still use the infected PC and it's internet without any further infection of non-infected files and without the infection spreading to other computers on the server?
Thanks
Thread moved to security, from general computer help. -Admin DrPizza
I'll find out more later on if we had backups of the files that were changed to .ecc, but for now I don't know.
I have a few questions if anyone is able to help:
1) Does anyone have any advice on fixing this issue and getting the files back to a normal extension without any infection?
2) Also, after the private key is destroyed, does anyone know if the files can still be decrypted?
3) Can we still use the infected PC and it's internet without any further infection of non-infected files and without the infection spreading to other computers on the server?
Thanks
Thread moved to security, from general computer help. -Admin DrPizza
Last edited by a moderator: