Yes, that's why they don't really target individuals. But if they've found a couple of sloppy companies, jackpot!
- that some institutions reverted to clean backups
- there are more than 3 addresses
- spread was stopped by a blogger who discovered a kill switch in the virus (this has been verified) - https://www.theguardian.com/technology/2017/may/13/accidental-hero-finds-kill-switch-to-stop-spread-of-ransomware-cyber-attack
There have to be more than 3 addresses. And it's Saturday, many companies cannot access their money until the banks open Monday. Only then we'll see how big the damage is...
If the files are truly encrypted, removing the ransomware will not get the files back. Unless there is a clean backup you either lose the data or pay the ransom, and there is no guarantee that the key to decrypt will be supplied.
Not necessarily.
If your files are on magnetic HD and not on an SSD, you could try to recover encrypted files by using a decent file recovery program. As long as the encryption process doesn't do too many passes on the file location on the platter you "might" be able to recover the original version.
Haven't tried it but its worth a shot. What other options do you have?
I've recovered files deleted 8 years ago off a customers pc a few years ago. BTW, I was using forensic-level recovery programs tho.