What? I mean back up your data. Not your whole... computer, or whatever. Install latest software, import data from back up, back in business.
It's trivial to tell intact data from ransomed data - the latter looks like random noise, as it's encrypted.
If your backup process "isn't that simple", then you should make it that simple. Otherwise failure looms.
You misunderstand. I'm saying the network has potentially been infiltrated for months, and there's no telling what configuration and files have been altered to facilitate future infiltration. See further discussion here: https://news.ycombinator.com/item?id=23929344
If your backup process "isn't that simple", then you should make it that simple. Otherwise failure looms.