If you have the vulnerable file types files in the local machine sync folders for those, then I presume if the local file gets encrypted then the encrypted version will get synced up to the cloud. The ransomware wouldn't be able to directly access a file in the cloud as I imagine it uses the Windows API.
One way back from this would be if you had volume shadow services working, which might let you step back through previous versions of a file. -- Alan Bourke alanpbourke (at) fastmail (dot) fm On Wed, 7 Oct 2015, at 04:52 PM, John Weller wrote: > Is CryptoLocker liable to attack cloud based data such as Dropbox, > oneDrive, > etc? > > John > > John Weller > 01380 723235 > 07976 393631 > > > > > > Kurt, > > The Cryptolocker ransomware only infected mapped drives (F:, G:.... etc) > and > > if your shortcuts on the desktop and elsewhere were all based upon URL's > > then Cryptolocker did NOT spread the infection. I don't know about the new > > variants as they may well differ but I made a change on all my clients > > removing mapped drives completely and the two instances since doing this > > (on different clients) were restricted to local files. > > > [excessive quoting removed by server] _______________________________________________ Post Messages to: [email protected] Subscription Maintenance: http://mail.leafe.com/mailman/listinfo/profox OT-free version of this list: http://mail.leafe.com/mailman/listinfo/profoxtech Searchable Archive: http://leafe.com/archives/search/profox This message: http://leafe.com/archives/byMID/profox/1444235118.3172694.403959777.034ef...@webmail.messagingengine.com ** All postings, unless explicitly stated otherwise, are the opinions of the author, and do not constitute legal or medical advice. This statement is added to the messages for those lawyers who are too stupid to see the obvious.

