Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Locky: are removable drives contagious?


  • Please log in to reply
No replies to this topic

#1 uhoh7

uhoh7

  • Members
  • 1 posts
  • OFFLINE
  •  
  • Local time:01:21 AM

Posted 21 February 2017 - 10:40 AM

Working with a machine partially encrypted by Locky, making osiris extensions. I've read the help guide, TY so much very informative :)

 

I want to grab files Locky has not encrypted, with external USB drive, freshly formatted. If I do so and then plug that fresh external drive with unencrypted files from Locky machine into an uninfected machine, can it be infected? How? 

 

This machine was on peer to peer network (it's off the network and shut down now). No mapped network drives. No sign of any encrypted files on any other machine. What is best way to be sure those machines don't have Locky? Emisoft?

 

It appears the Locky infected machine outlook .pst is not effected. We want to transfer that and get it up and running along with, other unencrypted office files. We have macros disabled on a clean machine. What danger to open the .pst there and apparently fine office files? The destination machine is clean with no critical data on it. We do want to put it on the network.

 

I have a EaseUS system recovery file on the Locky machine's backup drive, which appears uneffected, and which I'd like to use to restore system to fresh HD. (We will keep infected HD, unplugged in case we need it).

 

Is Locky known to attack EaseUS system recovery files?

 

This is all information I have searched for, but can't quite pin down. Thanks to everyone.

 

 

 

 

 

 



BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users