Kaspersky Lab Releases File Recovery Instructions For Gpcode.ak Attacks

Kaspersky Lab has released instructions on how to recover files attacked by the Gpcode.ak virus.

Gpcode is a form of ransome malware, which infects your computer, encrypts your files and then demands money in exchange for their safe return or decryption. The computer security company says that Gpcode.ak works by creating a new encrypted version of a file next to the original. Once encryption is complete, it deletes the original file and adds ._CRYPT to the extension of the newly-created files. It then places a text file named !_READ_ME_!.txt in the same folder, which contains the message,

Jane McEntegart
Contributor

Jane McEntegart is a writer, editor, and marketing communications professional with 17 years of experience in the technology industry. She has written about a wide range of technology topics, including smartphones, tablets, and game consoles. Her articles have been published in Tom's Guide, Tom's Hardware, MobileSyrup, and Edge Up.

  • Christopher1
    Does this attack work on Windows Vista? Or does the included security stop attacks like this in their tracks before they even get started?
    Reply
  • a 6pack in
    Christopher1Does this attack work on Windows Vista http://en.wikipedia.org/wiki/Windows_Vista ? Or does the included security stop attacks like this in their tracks before they even get started?I LOL'ed at that statement too.

    the thought of GPUs being no more.. is totally obsured. considering CUDA. I think that CPUs could be taking a bigger hit, dont ya think?
    Reply
  • seatrotter
    Christopher1Does this attack work on Windows Vista http://en.wikipedia.org/wiki/Windows_Vista ? Or does the included security stop attacks like this in their tracks before they even get started?The malware targets user files (.doc, .txt, .xls, etc). If you're thinking of something like the UAC, it won't stop it. UAC works on system files/configuration and doesn't protect user files. How about other users' files? Vista won't prompt the user, but will deny the malware (unless it's implemented to bypass user restrictions).

    Kaspersky probably already has signature for the caught/detected malware (probably, detected initually as suspicious software). But if the author uses a new kind of packing/encrypting for the malware, throw in some anti-debug and anti-kaspersky mechanism, then the new variation slip right thru.
    Reply
  • seatrotter
    Christopher1Does this attack work on Windows Vista http://en.wikipedia.org/wiki/Windows_Vista ? Or does the included security stop attacks like this in their tracks before they even get started?The malware targets user files (.doc, .txt, .xls, etc). If you're thinking of something like the UAC, it won't stop it. UAC works on system files/configuration and doesn't protect user files. How about other users' files? Vista won't prompt the user, but will deny the malware (unless it's implemented to bypass user restrictions).

    Kaspersky probably already has signature for the caught/detected malware (probably, detected initually as suspicious software). But if the author uses a new kind of packing/encrypting for the malware, throw in some anti-debug and anti-kaspersky mechanism, then the new variation slip right thru.
    Reply
  • seatrotter
    Sorry for the double post. After refreshing several times and not seeing the first post, I thought it didn't go thru. I guess that's TomsH comment system for you :)
    Reply
  • format my computre and saving all good filles
    Reply