VC/firex3m后缀勒索病毒处理 解密成功 恢复方案how_to_back_files.html

**中了后缀是VC的勒索病毒怎么办?
河南一食品公司中了后缀是VC的勒索病毒,文件被加密后,严重影响生产计划,找到我们后,一天内全部恢复完成

ALL YOUR IMPORTANT DATA HAS BEEN ENCRYPTED.

To recover data you need decryptor.
To get the decryptor you should:
Send 1 test image or text file [email protected].
In the letter include your personal ID (look at the beginning of this document).

We will give you the decrypted file and assign the price for decryption all files
After we send you instruction how to pay for decrypt and after payment you will receive a decryptor and instructions We can decrypt one file in quality the evidence that we have the decoder.
VC/firex3m后缀勒索病毒处理 解密成功 恢复方案how_to_back_files.html
为防止用户感染该类病毒,我们可以从安全技术和安全管理两方面入手:
1、不要打开陌生人或来历不明的邮件,防止通过邮件附件的***;
2、尽量不要点击office宏运行提示,避免来自office组件的病毒感染;
3、需要的软件从正规(官网)途径下载,不要双击打开.js、.vbs等后缀名文件;
4、升级到最新的防病毒等安全特征库;
5、升级防病毒软件到最新的防病毒库,阻止已存在的病毒样本***;
6、定期异地备份计算机中重要的数据和文件,万一中病毒可以进行恢复
7、找可靠的恢复数据公司解密**

猜你喜欢

转载自blog.51cto.com/14010823/2392257