Working with a machine partially encrypted by Locky, making osiris extensions. I've read the help guide, TY so much very informative
I want to grab files Locky has not encrypted, with external USB drive, freshly formatted. If I do so and then plug that fresh external drive with unencrypted files from Locky machine into an uninfected machine, can it be infected? How?
This machine was on peer to peer network (it's off the network and shut down now). No mapped network drives. No sign of any encrypted files on any other machine. What is best way to be sure those machines don't have Locky? Emisoft?
It appears the Locky infected machine outlook .pst is not effected. We want to transfer that and get it up and running along with, other unencrypted office files. We have macros disabled on a clean machine. What danger to open the .pst there and apparently fine office files? The destination machine is clean with no critical data on it. We do want to put it on the network.
I have a EaseUS system recovery file on the Locky machine's backup drive, which appears uneffected, and which I'd like to use to restore system to fresh HD. (We will keep infected HD, unplugged in case we need it).
Is Locky known to attack EaseUS system recovery files?
This is all information I have searched for, but can't quite pin down. Thanks to everyone.