Ransomware- Practical Advice To Protect & Recover Using Free Tools

It is the beginning of 2017 and 2016 has been the year of ransomware attacks. This phenomenon is expected to grow even further in 2017 and beyond.

There are concrete strategies and commercial tools available that you can use to protect yourself against these attacks. The purpose of this note is to share free tools to protect against ransomware attacks and options to recover in case you are already hit  using free tools.

 

Protection using free tools

RansomFree is a free tool and it claims to protect against 99% of ransomware strains, including never-before-seen types. This is a good option to use for windows systems. The tool works by identifying the typical pattern of behavior, knowing how and where ransomware will start encrypting files. This enables the tool to stops the encryption attempts targeting local disks, as well as detecting and stopping encryption over shared network drives. This is one of the best freely available option. RansomFree gets installed in 15-20 secs flat. You can download the tool from below link beleow:

Cybereason RansomeFree

Don't worry if you are a Mac OS X user. There is another free tool called RansomWhere which is for Mac users and can be downloaded from the below. This tool is developed by a former NSA staffer and is targeted towards detecting and blocking generic ransomwares.

RansomWhere

Recovery options

What are your options if you are already hit by the ransomware? Pay up or else...
You don't have to always pay. There are free decryptor tools available. The best bet here is global No More Ransom (NMR) project. This project was launched in 2016 by the Dutch National Police, Europol and cybersecurity vendors. This is the best example of cooperation between law enforcement agencies and the private sector to fight ransomware together. Enforcement agencies from 26 countries across Europe, as well as The European Commission and cybersecurity specialist companies are part of this project. This is one of the biggest forces created anywhere across the globe to fight ransomware attacks. As on date, there are more than 20 decryptor tools available which you can use to recover from ransomware attacks. You can access these tools from: 

NoMoreRansom

This list of tools and resources can only grow further by contributions from all of you and I encourage you to either share your suggestions in the comments section or contact me. Bad guys are so successful because bad guys collaborate, good guys don't and we have to change it. No More Ransom (NMR) project is a great start in this direction.

Dinesh Kumar Aggarwal is Security Architect at The Missing Link Network Integration & Security

Note: The Downloads recommended above have passed an Avast security scan, but Cyber Security Intelligence Ltd accepts no responsibilty for their use.

 

« Directors Report January 2017. Cyber Security Checklist For Management (£)
Emerging Details Of Cyber Assault On A Major UK Bank »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Masergy Communications

Masergy Communications

Masergy delivers hybrid networking, managed security and cloud communication solutions to enterprises around the globe.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

Cynerio

Cynerio

Cynerio develops cybersecurity protections for medical devices, comparing network behavior with a database of medical workflows.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

Quokka

Quokka

Quokka (formerly Kryptowire) is the source for mobile security and privacy solutions, staying steps ahead of the threat and delivering peace of mind.

National Cybersecurity Competence Centre (NC3) - Czech Republic

National Cybersecurity Competence Centre (NC3) - Czech Republic

NC3 has been established in response to growing demands for practically applicable products and solutions for ensuring cybersecurity of critical and non-critical information infrastructures.

Adlumin

Adlumin

Adlumin Inc. provides the enterprise-grade security operations platform and managed detection and response services that keep mid-market organizations secure.

Aigner Business Solutions

Aigner Business Solutions

Aigner Business Solutions GmbH is a specialist in IT-Security and Data Protection. Concise and focussed.

BaaSid

BaaSid

BaaSid is next generation security technology for data security & security authentication based on De-centralized & Blockchain.

Hackuity

Hackuity

Hackuity is a breakthrough technology solution that rethinks the way of managing IT vulnerabilities in enterprises.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

WireGuard

WireGuard

WireGuard is a communication protocol and free and open-source software that implements encrypted virtual private networks (VPNs).

Sequentur

Sequentur

Sequentur is an award-winning Managed IT Services company. We are SOC 2 certified and provide Managed IT Services and Cybersecurity services to businesses nationwide.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Datagroup

Datagroup

Datagroup makes IT easy. Our IT experts ensure that your technology is always up to date with perfectly customized solutions.