Jump to content


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.

Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.


Criptowall 3.0

  • This topic is locked This topic is locked
1 reply to this topic

#1 maxiluka


  • Members
  • 7 posts
  • Local time:02:19 AM

Posted 20 March 2015 - 09:59 PM

Hi, this is Maxiluka, and belive I'm in the right place to inquire about criptowall 3.0 that hit us 48 hours ago and lost thousands of files, most of them fortunalety with a back-up at hand. The issue now is what to do with our windows server 2008r2 that seems no infected itself, (the encryption affected aprox a third of its files), I need please urgent assistance with a method to survey the servver in search of this malware and if this is the case to clean it.

Regarding the client PC's, there is at least on of them that for sure got hit and I believe this one was the host to the virus to reach the server,s volumes ans folders, I'm preparing to format this PC and configure all from scratch, but again, the most important thing for now is how to proceed with the server.

Regards, Maxiluka (I will be working this week-end).

PD:My first language as it may be clear is not english, so be patient with me. Thanks in advance

BC AdBot (Login to Remove)


#2 quietman7


    Bleepin' Janitor

  • Global Moderator
  • 52,087 posts
  • Gender:Male
  • Location:Virginia, USA
  • Local time:12:19 AM

Posted 21 March 2015 - 07:23 AM

:welcome: to Bleeping Computer.

A repository of all current knowledge regarding CryptoWall, CryptoWall 2.0 & CryptoWall 3.0 is provided by Grinler (aka Lawrence Abrams), in this tutorial: CryptoWall and DECRYPT_INSTRUCTION Ransomware Information Guide and FAQ

Reading that Guide will help you understand what CryptoWall (including versions 2.0 & 3.0) does and provide information for how to deal with it. Cryptowall typically deletes all Shadow Volume Copies with vssadmin.exe so that you cannot restore your files via System Restore or using a program like Shadow Explorer...but it never hurts to try. At this time there is no fix tool and Decryption of any CryptoWall Files...is impossible since there is no way to retrieve the private key that can be used to decrypt your files without paying the ransom.

There is also a lengthy ongoing discussion in this topic: CryptoWall - new variant of CryptoDefense Support & Discussion Topic.

Rather than have everyone start individual topics, it would be best (and more manageable for staff) if you posted any questions, comments or requests for assistance in that topic discussion.

The BC Staff
Windows Insider MVP 2017-2018
Microsoft MVP Reconnect 2016
Microsoft MVP Consumer Security 2007-2015 kO7xOZh.gif
Member of UNITE, Unified Network of Instructors and Trusted Eliminators

If I have been helpful & you'd like to consider a donation, click 38WxTfO.gif

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users