Ransomware- Practical Advice To Protect & Recover Using Free Tools

It is the beginning of 2017 and 2016 has been the year of ransomware attacks. This phenomenon is expected to grow even further in 2017 and beyond.

There are concrete strategies and commercial tools available that you can use to protect yourself against these attacks. The purpose of this note is to share free tools to protect against ransomware attacks and options to recover in case you are already hit  using free tools.

 

Protection using free tools

RansomFree is a free tool and it claims to protect against 99% of ransomware strains, including never-before-seen types. This is a good option to use for windows systems. The tool works by identifying the typical pattern of behavior, knowing how and where ransomware will start encrypting files. This enables the tool to stops the encryption attempts targeting local disks, as well as detecting and stopping encryption over shared network drives. This is one of the best freely available option. RansomFree gets installed in 15-20 secs flat. You can download the tool from below link beleow:

Cybereason RansomeFree

Don't worry if you are a Mac OS X user. There is another free tool called RansomWhere which is for Mac users and can be downloaded from the below. This tool is developed by a former NSA staffer and is targeted towards detecting and blocking generic ransomwares.

RansomWhere

Recovery options

What are your options if you are already hit by the ransomware? Pay up or else...
You don't have to always pay. There are free decryptor tools available. The best bet here is global No More Ransom (NMR) project. This project was launched in 2016 by the Dutch National Police, Europol and cybersecurity vendors. This is the best example of cooperation between law enforcement agencies and the private sector to fight ransomware together. Enforcement agencies from 26 countries across Europe, as well as The European Commission and cybersecurity specialist companies are part of this project. This is one of the biggest forces created anywhere across the globe to fight ransomware attacks. As on date, there are more than 20 decryptor tools available which you can use to recover from ransomware attacks. You can access these tools from: 

NoMoreRansom

This list of tools and resources can only grow further by contributions from all of you and I encourage you to either share your suggestions in the comments section or contact me. Bad guys are so successful because bad guys collaborate, good guys don't and we have to change it. No More Ransom (NMR) project is a great start in this direction.

Dinesh Kumar Aggarwal is Security Architect at The Missing Link Network Integration & Security

Note: The Downloads recommended above have passed an Avast security scan, but Cyber Security Intelligence Ltd accepts no responsibilty for their use.

 

« Directors Report January 2017. Cyber Security Checklist For Management (£)
Emerging Details Of Cyber Assault On A Major UK Bank »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

Mosaic 451

Mosaic 451

Mosaic451 is a bespoke IT managed services provider and consultancy specializing in information security, operations and design.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

Montreal International

Montreal International

You’re an entrepreneur planning to launch a company in an innovative sector such as AI, cybersecurity, 'deeptech' or fintech? You’ve found the right place!

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

Brookcourt Solutions

Brookcourt Solutions

Brookcourt Solutions delivers cyber security, network monitoring technologies and managed security services to help secure and protect your organisation’s critical infrastructure.

Edgile

Edgile

Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

6clicks

6clicks

6clicks is an easy way to implement your risk and compliance program or achieve compliance with ISO 27001, SOC 2, PCI-DSS, HIPAA, NIST, FedRAMP and many other standards.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Proximus Ada

Proximus Ada

Proximus Ada is the first Belgian center of excellence combining artificial intelligence and cybersecurity.

Vector Choice Technologies

Vector Choice Technologies

Vector Choice Technology Solutions has a long standing reputation in cyber security consulting since 2008.

Recast Software

Recast Software

Recast Software exists to simplify the work of IT teams and enable them to create highly secure and compliant environments.

Reaktr.ai

Reaktr.ai

Reaktr.ai is founded on the vision of using AI as a catalyst to propel industries into a future where we redefine what's possible. Fortify your cybersecurity defense with our AI-powered platform.

BJSS

BJSS

BJSS is an award-winning technology and engineering consultancy for business.