home - Safety
How to recover files after encrypting the WannaCry ransomware virus

Sandbox

funny barbel May 18, 2017 at 09:52

How to recover files after encrypting the WannaCry ransomware virus

Good afternoon, Habrazhiteliki. A lot has been written on Habré about how to protect yourself from WannaCry. But for some reason, nowhere was it explained how to return encrypted data. I want to fill this gap. And shed a little light on how we did this in our “well-known” company involved in logistics. This is more of an instruction for our information security administrators.

Recovery after data encryption

This is not Decryption, but rather Recovery. And it only works if shadow copying is enabled in windows, i.e. Data can be restored from Windows restore points itself.


To do this, you can use the ShadowExplorer utility - it is free and allows you to restore files from recovery points. Restore points are created every time the system is updated and old ones are overwritten by new ones. The number of points depends on the space allocated for recovery points. On average, 5-6 of them are stored on the average Windows.

Select a recovery point and you can export files and directories to the location you need:

Select those files that are not yet encrypted and export them to the location you need.

(In some cases, when the update has already passed, those recovery points may be overwritten when the files were not yet encrypted. It is also possible that some of the data is already encrypted in the recovery points, but some is not yet. You need to restore only what can be restored.)

That, in principle, is all that is required for restoration where possible.

Important! After restoring files, you need to erase those recovery points where the data was already encrypted. It has been noticed that this is where the virus restores itself after cleaning.

Recover data, as well as neutralize and remove the virus:

1. Disconnect your computer from the network
2. Next, you need to use the utility wann_kill_v_(version number) - this utility kills the virus process. The virus signatures themselves remain stored in the system. We do this because when you bring a flash drive to the computer that needs to be disinfected, the virus encrypts the flash drive. It is important to run this utility before the virus gets onto the flash drive.


3. Clean your Computer using DrWeb CureIt (here the virus itself is removed from the computer)
4. Recover the data you need as described above “ After data encryption»
5. (Only after data recovery) Destroy recovery points, because this is where the virus restores itself after cleaning.


System protection:


Tune:


Delete.

6. Then roll out the KB4012212 patch, thereby closing the MS17-010 network vulnerability
7. Turn on the network and install (or update) anti-virus software.

That's basically how I fought the Wanna Cry virus.

Tags: WannaCry, Decryption



 


Read:



Putting things in order - cleaning the hard drive in Windows 10

Putting things in order - cleaning the hard drive in Windows 10

If you work a lot and intensively on your computer, you can quickly fill your hard drive partitions with documents and files. For solid state...

Wanna Cry “shouted” to the whole world - how to solve the virus problem

Wanna Cry “shouted” to the whole world - how to solve the virus problem

Yes, this virus shouted very loudly to the whole world on May 12th. Wanna Cry turned out to be not a virus that quietly and calmly spreads throughout the world...

Temporary mail for 10 minutes without registration

Temporary mail for 10 minutes without registration

I think you have already encountered such a situation when you needed to register on some site, for example, in, and for this...

What to do and how to unlock?

What to do and how to unlock?

Many users of the Odnoklassniki social network complain that they cannot get to their page - supposedly it is blocked. But why? How...

feed-image RSS