for display only
Big Blue Interactive The Corner Forum  
Back to the Corner

Archived Thread

NFT: My wife's laptop hit with sodinokibi ransomware.

Bubba : 1/13/2020 12:09 pm
All files, pics etc unaccessible. Her last backup was a few months ago. Any suggestions as to how to unlock her files?

Thanks
One way  
Scott in Montreal : 1/13/2020 12:29 pm : link
Download a copy of Ubuntu and make a bootable usb stick. You will need a second laptop to create the usb and a second usb to save your files on.

You can then run the Ubuntu from the usb stick and access the infected hard drives. You can then download all your pictures etc.. onto a second usb stick.

Then just reformat the infected computer afterwards and start fresh.

I just had this issue with a friends laptop. You need a bit of CPU knowledge but it works.
Thanks Scott  
Bubba : 1/13/2020 12:37 pm : link
I'll look into this.
Is the PC locked up?  
x meadowlander : 1/13/2020 12:39 pm : link
I've had viruses that make it impossible to perform ANY Windows task.

If that's the case, you need to fire up good old DOS, and use text commands to navigate to the stick.
RE: Is the PC locked up?  
Scott in Montreal : 1/13/2020 12:47 pm : link
In comment 14776666 x meadowlander said:
Quote:
I've had viruses that make it impossible to perform ANY Windows task.

If that's the case, you need to fire up good old DOS, and use text commands to navigate to the stick.


The Ubuntu OS will not need any access to anything windows. It sees the other laptop HD's as storage only.
The system is usable.  
Bubba : 1/13/2020 12:49 pm : link
The problem is that the desktop document and pictures everything you need is locked up
When ever you get them, they are un usable (encrypted)
If the copies are locked  
Scott in Montreal : 1/13/2020 1:23 pm : link
on the new usb still after the linux usb way I suggested. As I mentioned when I did it this way it worked well but it was not the sodinokibi ransomware.

The webpage linked has a second method specifically for your ransomware. This page explains the method that your ransomware works. www.acronis.com/en-eu/articles/sodinokibi-ransomware/
Sodinokibi ransomware removal - ( New Window )
How does something like this happen?  
moze1021 : 1/13/2020 1:34 pm : link
.
moze  
Bubba : 1/13/2020 2:03 pm : link
could be as simple as accepting a friend request on facebook. Most often its opening emails.
Scott  
Bubba : 1/13/2020 2:16 pm : link
according to my IT guy the recommended software doesn't even touch it. They are using Malwarebytes Premium. It will take them a few days to get to us as they are working on a first come first serve basis.
Sorry to say  
imloungin : 1/13/2020 3:18 pm : link
but your options at this point are likely limited to:

1. Restore from backup
2. Pay the ransom

Companies like Bitdefender put out decryption tools for some ransomware variants like Gandcrab, though I do not believe any such tools exist for Sodinokibi.

I recommend you immediately disconnect that laptop from your network, avoid connecting to any other networks until the system has been confirmed to be clean, and that all security patches are up-to-date.
Paying them would be stupid  
Hsilwek92 : 1/13/2020 3:31 pm : link
That rarely works, if ever. They’ll just take your money and then leave you just as screwed but with a lighter bank account.
RE: If the copies are locked  
Ron from Ninerland : 1/13/2020 4:14 pm : link
In comment 14776772 Scott in Montreal said:
Quote:
on the new usb still after the linux usb way I suggested. As I mentioned when I did it this way it worked well but it was not the sodinokibi ransomware.

The webpage linked has a second method specifically for your ransomware. This page explains the method that your ransomware works. www.acronis.com/en-eu/articles/sodinokibi-ransomware/ Sodinokibi ransomware removal - ( New Window )
According to this article the ransomware works by encrypting the the victims files. If thats the case I don't see how your suggestion will work. An Ubuntu USB stick will allow you to boot the system and access the disk partitions and maybe even the individual files, depending on how the encryption was done. But those files will be useless if they are encrypted.
RE: RE: If the copies are locked  
Scott in Montreal : 1/13/2020 7:44 pm : link
In comment 14777297 Ron from Ninerland said:
Quote:
In comment 14776772 Scott in Montreal said:


Quote:


on the new usb still after the linux usb way I suggested. As I mentioned when I did it this way it worked well but it was not the sodinokibi ransomware.

The webpage linked has a second method specifically for your ransomware. This page explains the method that your ransomware works. www.acronis.com/en-eu/articles/sodinokibi-ransomware/ Sodinokibi ransomware removal - ( New Window )

According to this article the ransomware works by encrypting the the victims files. If thats the case I don't see how your suggestion will work. An Ubuntu USB stick will allow you to boot the system and access the disk partitions and maybe even the individual files, depending on how the encryption was done. But those files will be useless if they are encrypted.


Like I mentioned. I did it and it worked not long ago. It was not this particular "virus" . I wish I could remember the name. When I did it there were no extra extensions on the files. I copied everything over to the extra usb and checked by opening them on my laptop which is Linux.
Sodinokibi  
Bill in UT : 1/13/2020 8:51 pm : link
Isn't that our new QB coach?
RE: RE: RE: If the copies are locked  
newjacksm : 1/13/2020 9:44 pm : link
In comment 14777660 Scott in Montreal said:
Quote:
In comment 14777297 Ron from Ninerland said:


Quote:


In comment 14776772 Scott in Montreal said:


Quote:


on the new usb still after the linux usb way I suggested. As I mentioned when I did it this way it worked well but it was not the sodinokibi ransomware.

The webpage linked has a second method specifically for your ransomware. This page explains the method that your ransomware works. www.acronis.com/en-eu/articles/sodinokibi-ransomware/ Sodinokibi ransomware removal - ( New Window )

According to this article the ransomware works by encrypting the the victims files. If thats the case I don't see how your suggestion will work. An Ubuntu USB stick will allow you to boot the system and access the disk partitions and maybe even the individual files, depending on how the encryption was done. But those files will be useless if they are encrypted.



Like I mentioned. I did it and it worked not long ago. It was not this particular "virus" . I wish I could remember the name. When I did it there were no extra extensions on the files. I copied everything over to the extra usb and checked by opening them on my laptop which is Linux.


What you are mentoning will not work for any ransomware. Please do not suggest this for ransomware.

What you are suggesting is someone should essentially mount there drive to a Linux OS and copy there files over, which would normally be fine (and really an obtuse process) for any other malware out there. But with Ransomeware it just locks your files up.

At this point in time, you really can't do anything unless a security research team have come out with an application or algorithiim to decrypt and get you the ransomware key.

My suggestion/Questions:

1. What was the most important thing to you on this machine?
If its pictures, do you have them backed up on google photos or icloud? Don't worry blow out the machine, start fresh.
2. Documents: Same to what I mentioned above, blow out the machine; if not it is a loss.
3. Applications/Programs: Unfortunately these will be lost anyways and you will have to install from scratch.

Ransomware at a personal level is much easier to handle then an enterprise level, don't give in and don't pay them.

Double check your cloud accounts (OneDriive, Google Docs/Photos, and iCloud)

Best of luck.
Newjack
RE: Sodinokibi  
micky : 1/13/2020 10:17 pm : link
In comment 14777773 Bill in UT said:
Quote:
Isn't that our new QB coach?


Yes, and you butchered his name
Newjack  
Bubba : 1/14/2020 7:12 am : link
Thanks. My IT guy came to basically the same conclusion. I was hoping for a more simple fix. Fortunately we do have a backup. Unfortunately the IT guy is busy restoring several other systems. This bug apparently hit on Thurs nite around 5:15pm est. He and staff are working on first come first serve.
I would reccomend MalwareBytes Premium  
newjacksm : 1/14/2020 12:06 pm : link
if this is a small business/personal machine and just be more careful with what file attachments you open.

If you are at an enterprise level 500-1000+ machines there are other tools out there you can get.

I would also disable admin powershell (or at least require the use of a password) on the machine since thats how most ransomeware lock your files.
Newjack  
Bubba : 1/14/2020 2:00 pm : link
Thanks again. That is the software my it guys uses too.
Back to the Corner