Ransomware- Practical Advice To Protect & Recover Using Free Tools

It is the beginning of 2017 and 2016 has been the year of ransomware attacks. This phenomenon is expected to grow even further in 2017 and beyond.

There are concrete strategies and commercial tools available that you can use to protect yourself against these attacks. The purpose of this note is to share free tools to protect against ransomware attacks and options to recover in case you are already hit  using free tools.

 

Protection using free tools

RansomFree is a free tool and it claims to protect against 99% of ransomware strains, including never-before-seen types. This is a good option to use for windows systems. The tool works by identifying the typical pattern of behavior, knowing how and where ransomware will start encrypting files. This enables the tool to stops the encryption attempts targeting local disks, as well as detecting and stopping encryption over shared network drives. This is one of the best freely available option. RansomFree gets installed in 15-20 secs flat. You can download the tool from below link beleow:

Cybereason RansomeFree

Don't worry if you are a Mac OS X user. There is another free tool called RansomWhere which is for Mac users and can be downloaded from the below. This tool is developed by a former NSA staffer and is targeted towards detecting and blocking generic ransomwares.

RansomWhere

Recovery options

What are your options if you are already hit by the ransomware? Pay up or else...
You don't have to always pay. There are free decryptor tools available. The best bet here is global No More Ransom (NMR) project. This project was launched in 2016 by the Dutch National Police, Europol and cybersecurity vendors. This is the best example of cooperation between law enforcement agencies and the private sector to fight ransomware together. Enforcement agencies from 26 countries across Europe, as well as The European Commission and cybersecurity specialist companies are part of this project. This is one of the biggest forces created anywhere across the globe to fight ransomware attacks. As on date, there are more than 20 decryptor tools available which you can use to recover from ransomware attacks. You can access these tools from: 

NoMoreRansom

This list of tools and resources can only grow further by contributions from all of you and I encourage you to either share your suggestions in the comments section or contact me. Bad guys are so successful because bad guys collaborate, good guys don't and we have to change it. No More Ransom (NMR) project is a great start in this direction.

Dinesh Kumar Aggarwal is Security Architect at The Missing Link Network Integration & Security

Note: The Downloads recommended above have passed an Avast security scan, but Cyber Security Intelligence Ltd accepts no responsibilty for their use.

 

« Directors Report January 2017. Cyber Security Checklist For Management (£)
Emerging Details Of Cyber Assault On A Major UK Bank »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CyberScout

CyberScout

Cyberscout delivers the latest cybersecurity education, protection and resolutions services. We also provide swift incident response services around the world.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

Sysmosoft

Sysmosoft

Sysmosoft specializes in providing highly secured telecommunication solutions for mobile devices for companies requiring protected access to sensitive data remotely.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

Armenia Startup Academy

Armenia Startup Academy

Armenia Startup Academy is a pre-acceleration program for selected Armenian tech companies and startups in areas including cybersecurity.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

European Center for CyberSecurity in Aviation (ECCSA)

European Center for CyberSecurity in Aviation (ECCSA)

ECCSA is a cooperative partnership within the aviation community to better understand emerging cybersecurity risks in aviation and provide collective support in dealing with cybersecurity incidents.

HackEDU

HackEDU

HackEDU provides secure coding training to companies ranging from startups to the Fortune 500.

Secuna Software Technologies

Secuna Software Technologies

Secuna is the most trusted Cybersecurity Testing Platform in the Philippines. Our pool of vetted security researchers will find and ethically report security vulnerabilities in your product.

Ridge Security

Ridge Security

Ridge Security enables enterprise and web application teams, ISVs, governments, education, DevOps, anyone responsible for ensuring software security to affordably and efficiently test their systems.

SilverEdge Government Solutions

SilverEdge Government Solutions

SilverEdge is a next generation provider of innovative and proprietary cybersecurity, software, and intelligence solutions for the Defense and Intelligence Communities.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

Dream

Dream

Dream is developing an AI platform that enables cyber resilience and protects nations from hostile nation-states cyber attacks.