How to test your computers vulnerability to CryptoLocker style ransonware

Ransomware is becoming a growing problem, posing a massive threat to all computer users – particularly businesses with many users and shared network drives.

The typical ransomware starts with a user being invited to “open” a document, but what they don’t realise that it is actually a program that silently starts encrypting every document the user has access to- even if they don’t have admin-rights on the computer. Once the files are encrypted the user offered the chance to decrypt the files for a fee.

RanSim is a free tool for Windows that will simulate several ransom-ware style attacks and will let you know how vulnerable your computer is. Providing you the opportunity to test various anti-virus tools.

It will ONLY simulate ransomware – it DOES NOT encrypt any files.

It tests vulnerability for:

  1. InsideCryptor – encrypts files using strong encryption and overwrites most of the content of the original files with the encrypted data.
  2. LockyVariant – simulates the behavior of a recent version of Locky ransomware.
  3. Mover – Encrypts files in a different folder using strong encryption and safely deletes the original files.
  4. Replacer – Replaces the content of the original files. A real ransomware would show a message that fools users into thinking they can recover them.
  5. Streamer – Encrypts files and writes data into a single file, using strong encryption, then deletes the original files.
  6. StrongCryptor – Encrypts files using strong encryption and safely deletes the original files.
  7. StrongCryptorFast – Encrypts files using strong encryption and deletes the original files.
  8. StrongCrytptorNet – Encrypts files using strong encryption and deletes the original files. It also simulates sending the encryption key to a server using an HTTP connection.
  9. ThorVariant – Simulates the behavior of a recent version of Thor ransomware.
  10. WeakCryptor – Encrypts files using weak encryption and deletes the original files.

DOWNLOAD: From the developer (requires personal information provided in a form) or from Major Geeks mirror.

Was this article helpful?

Related Articles