- Reaction score
- 84
- Location
- East Coast, NC (USA)
I did not experience that today with the Cryptolocker virus. The shadow copies were there but they were encrypted.
.
How can you be sure that the shadow copies were directly encrypted by the malware and not just copies of the encrypted files themselves after the malware encrypted the files.
Actually what I would put my money on, was that they were they weren't encrypted, but rather just 'corrupted' because Shadow Explorer 'found' them after VSSADMIN actually deleted them, which is why they weren't visible with Windows built-in Previous Versions, that makes more sense to me...
I'm only asking because I didn't think it possible to actually manipulate shadow copies directly - while they are still shadow copies. If it is, then I still don't think the malware is that sophisticated (it sure isn't as far as delivery method.) Thinking about it, if it was, then why would it need VSSADMIN in order to delete the shadow copies in the first place, if it could directly manipulate them to encrypt it could do the same to delete...
EDIT: The whole reason I'm pressing the issue is that I'm considering what blocking VSSADMIN as a preventative would do... though admittedly I still need to research if that would mess up the actual shadow copies getting created themselves or other potential side effects...
Last edited: