Ransomware- Practical Advice To Protect & Recover Using Free Tools

It is the beginning of 2017 and 2016 has been the year of ransomware attacks. This phenomenon is expected to grow even further in 2017 and beyond.

There are concrete strategies and commercial tools available that you can use to protect yourself against these attacks. The purpose of this note is to share free tools to protect against ransomware attacks and options to recover in case you are already hit  using free tools.

 

Protection using free tools

RansomFree is a free tool and it claims to protect against 99% of ransomware strains, including never-before-seen types. This is a good option to use for windows systems. The tool works by identifying the typical pattern of behavior, knowing how and where ransomware will start encrypting files. This enables the tool to stops the encryption attempts targeting local disks, as well as detecting and stopping encryption over shared network drives. This is one of the best freely available option. RansomFree gets installed in 15-20 secs flat. You can download the tool from below link beleow:

Cybereason RansomeFree

Don't worry if you are a Mac OS X user. There is another free tool called RansomWhere which is for Mac users and can be downloaded from the below. This tool is developed by a former NSA staffer and is targeted towards detecting and blocking generic ransomwares.

RansomWhere

Recovery options

What are your options if you are already hit by the ransomware? Pay up or else...
You don't have to always pay. There are free decryptor tools available. The best bet here is global No More Ransom (NMR) project. This project was launched in 2016 by the Dutch National Police, Europol and cybersecurity vendors. This is the best example of cooperation between law enforcement agencies and the private sector to fight ransomware together. Enforcement agencies from 26 countries across Europe, as well as The European Commission and cybersecurity specialist companies are part of this project. This is one of the biggest forces created anywhere across the globe to fight ransomware attacks. As on date, there are more than 20 decryptor tools available which you can use to recover from ransomware attacks. You can access these tools from: 

NoMoreRansom

This list of tools and resources can only grow further by contributions from all of you and I encourage you to either share your suggestions in the comments section or contact me. Bad guys are so successful because bad guys collaborate, good guys don't and we have to change it. No More Ransom (NMR) project is a great start in this direction.

Dinesh Kumar Aggarwal is Security Architect at The Missing Link Network Integration & Security

Note: The Downloads recommended above have passed an Avast security scan, but Cyber Security Intelligence Ltd accepts no responsibilty for their use.

 

« Directors Report January 2017. Cyber Security Checklist For Management (£)
Emerging Details Of Cyber Assault On A Major UK Bank »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Sage Designs

Sage Designs

Sage Designs is a provider of SCADA, Security & Industrial Automation products and training programs.

Sift

Sift

The Sift Digital Trust Platform protects your business and customers from all vectors of fraud and abuse through our Live Machine Learning, global trust network and automation technologies.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Padlock

Padlock

Padlock is a trusted platform with an intimate knowledge of the cybersecurity industry that connects businesses with freelance professionals

Polish Centre for Accreditation (PCA)

Polish Centre for Accreditation (PCA)

PCA is the national accreditation body for Poland. The directory of members provides details of organisations offering certification services for ISO 27001.

Verodin

Verodin

Verodin is a business platform that provides organizations with the evidence needed to measure, manage and improve their cybersecurity effectiveness.

Randstad

Randstad

Randstad provide outsourcing, staffing, consulting and workforce solutions in the USA across a wide range of job sectors including IT and cybersecurity.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Ross & Baruzzini

Ross & Baruzzini

Ross & Baruzzini delivers integrated technology, consulting, and engineering solutions for safe, sustainable, and resilient facilities.

DataSolutions

DataSolutions

DataSolutions is a leading value-added distributor of transformational IT solutions in the UK and Ireland.

CertiProf

CertiProf

CertiProf has been enhancing professional lives since 2015, offering a wide range of IT certifications and agile framework training.

Cyber Unit

Cyber Unit

Cyber Unit offer next level protection from cyber attacks in packages and pricing options that are accessible to smaller organizations.

Camms

Camms

Camms are a team of experienced professionals dedicated to providing innovative GRC software solutions that help organizations manage risk, make informed decisions, and drive positive change.

CSIRT-Gnd

CSIRT-Gnd

CSIRT-Gnd provides 24x7 Computer Security Incident Response Services to citizens, companies and government agencies in Grenada.

Mitra Informatics Integration (MII)

Mitra Informatics Integration (MII)

Mitra Informatics Integration is the information communication technology solution business of the Metrodata Group.