What If Your Computer Gets Zepto Ransomware

Posted by Jenny R.
6
Nov 4, 2016
155 Views

What is Zepto

Zepto is one of the several new or updated types of ransomware attacks hitting users hard during the last few months. It encrypts files using strong encryption algorithm and adds “.zepto” as file extensions of encrypted files. It demands 0.5 BTC which is about $315 from infected users.

Zepto ransomware is very similar to the well-known Locky ransomware, and the consequences of an attack are the same: your files end up scrambled, at which point the crooks offer to sell you the decryption key. The malware authors behind Zepto use the same methods used to spread Locky, and even the infection vector and the TOR payment page are the same, which inevitably makes people think that the author behind Locky are now spreading Zepto.

There is no much change of the methods for distribute this ransomware. Just like other malware infection, Zepto may arrive in the form of an attachment to spam or phishing emails. The email contains a malicious JavaScript file and once opened, the installation processes begin. It may also come via drive-by-download from phishing links and exploit kits. Most documents that carry macro-based ransomware include some sort of explanation or excuse to encourage you to click on and change your security settings – often, ironically, under the guise of improving security somehow.

If you have become a victim of this virus, you are likely to experience an obvious slowdown in the performance of your system as a whole. In fact, the possible slower performance is dependent on the speed and the power of your processor. However, more or less obviously, the encoding Zepto Virus tends to perform usually takes time and incredible amounts of resources.

Zepto also tries to delete data from the Volume Shadow Copy Service using a very unusual method implemented via direct API calls from the vssapi.dll library. If this method fails, Shadow Copy will be deleted.

The general advice is not to pay the ransom. By sending your money to cybercriminals you’ll only confirm that ransomware works, and there’s no guarantee for getting the decryption key you need in return.

How to Remove Zepto Ransomware from the Infected System

Below you will find instructions on how to manually remove Zepto from your system and how to attempt to restore some of your data.

Boot in Safe Mode

 

For all Windows versions:

1) Press Windows Button + R

2) In the Run window, type msconfig and click on OK

3) A System Configuration window will appear. In it Select the Boot sub-menu.

4) From there, select Safe Boot and click on Network below it.

Stop Zepto processes

 

1) Simultaneously press CTRL+ESC+SHIFT on your keyboard.

2) Go to the Processes tab.

3) Select a process which you believe is Zepto, right-click it and choose Open File Location.

4) Right-click on the Zepto process and click on End Process to end it and delete all of the suspicious files associated with Zepto from its location folder.

DeleteZepto Registry Objects

 

For all Windows versions:

1) Press Windows Button + R.

2) Type regedit and click on OK.

3) Press CTRL+F. and type “ Zepto ” or other file-names or related information to it in the search box.

4) After you have located keys containing the name, delete them.

Win 7 Users: Click Start and type regedit –> Enter –> Press CTRL + F buttons –> Type Zepto in the search field.

Win 8/10 users: Start Button –> Choose Run –> type regedit –> Enter Press CTRL + F buttons. Type “ Zepto ” in the search field.

Alternative Method to Recover files encrypted by the Zepto.

 

To do this, we have suggested several alternative solutions:

Method 1: System Restore

1) Press Windows Button + R.

2) In the run Window that appears, type rstrui and click OK.

3) Select a Restore Point and apply it.

 

Method 2: Shadow Volume Copies

To access shadow volume copies you may require a program, like Shadow Explorer.

 

Method 3: Data Recovery Software

 

This method may not give you 100 percent effectiveness, but it is worth a try, even if it restores a small portion of the data.

Ransomware can be delivered to your PC or mobile device in any number of ways, but a good overall preventive measure is to avoid questionable emails, websites, ads and downloads. A reputable and advanced anti-virus application is also advised.

Comments
avatar
Please sign in to add comment.