Ransomware- Practical Advice To Protect & Recover Using Free Tools

It is the beginning of 2017 and 2016 has been the year of ransomware attacks. This phenomenon is expected to grow even further in 2017 and beyond.

There are concrete strategies and commercial tools available that you can use to protect yourself against these attacks. The purpose of this note is to share free tools to protect against ransomware attacks and options to recover in case you are already hit  using free tools.

 

Protection using free tools

RansomFree is a free tool and it claims to protect against 99% of ransomware strains, including never-before-seen types. This is a good option to use for windows systems. The tool works by identifying the typical pattern of behavior, knowing how and where ransomware will start encrypting files. This enables the tool to stops the encryption attempts targeting local disks, as well as detecting and stopping encryption over shared network drives. This is one of the best freely available option. RansomFree gets installed in 15-20 secs flat. You can download the tool from below link beleow:

Cybereason RansomeFree

Don't worry if you are a Mac OS X user. There is another free tool called RansomWhere which is for Mac users and can be downloaded from the below. This tool is developed by a former NSA staffer and is targeted towards detecting and blocking generic ransomwares.

RansomWhere

Recovery options

What are your options if you are already hit by the ransomware? Pay up or else...
You don't have to always pay. There are free decryptor tools available. The best bet here is global No More Ransom (NMR) project. This project was launched in 2016 by the Dutch National Police, Europol and cybersecurity vendors. This is the best example of cooperation between law enforcement agencies and the private sector to fight ransomware together. Enforcement agencies from 26 countries across Europe, as well as The European Commission and cybersecurity specialist companies are part of this project. This is one of the biggest forces created anywhere across the globe to fight ransomware attacks. As on date, there are more than 20 decryptor tools available which you can use to recover from ransomware attacks. You can access these tools from: 

NoMoreRansom

This list of tools and resources can only grow further by contributions from all of you and I encourage you to either share your suggestions in the comments section or contact me. Bad guys are so successful because bad guys collaborate, good guys don't and we have to change it. No More Ransom (NMR) project is a great start in this direction.

Dinesh Kumar Aggarwal is Security Architect at The Missing Link Network Integration & Security

Note: The Downloads recommended above have passed an Avast security scan, but Cyber Security Intelligence Ltd accepts no responsibilty for their use.

 

« Directors Report January 2017. Cyber Security Checklist For Management (£)
Emerging Details Of Cyber Assault On A Major UK Bank »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

DoD Cyber Crime Center (DC3)

DoD Cyber Crime Center (DC3)

DC3 is a US Department of Defense (DoD) center of excellence for Digital and Multimedia forensics.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

Referentia

Referentia

Referentia leads the development of critical infrastructure solutions that benefit society, including cyber security and network performance management.

Accolade Technology

Accolade Technology

Accolade provides the most technologically advanced host cpu offload, 100% packet capture FPGA-based PCIe adapters and 1U platforms available in the network monitoring and cyber security markets.

Horangi

Horangi

Horangi provides security products and services that enable the rapid delivery of Incident Response and threat detection for our customers who lack the scale, expertise, or time to do it themselves.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

River Loop Security

River Loop Security

River Loop Security specialize in solving complex cybersecurity challenges in the IoT and embedded devices space.

Alacrinet

Alacrinet

Alacrinet is an IT and cyber security consultancy. From penetration testing to fully managed MSSP, our team is focused on knowing the latest threats, preventing vulnerabilities, and providing value.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Cyber7

Cyber7

CYBER7 is a National Cyber Security Innovation community initiated by Israel National Cyber Directorate, Ministry of Economy and Israel Innovation Authority led by Tech7 – Venture Studio.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

Anjuna Security

Anjuna Security

Software from Anjuna Security effortlessly enables enterprises to safely run even their most sensitive workloads in the public cloud.

Xeol

Xeol

Software free of vulnerabilities, built and distributed by trusted entities. Our mission is to help customers secure their software from code to deploy.