RanSim simulator ransomware: Are you safe?

Ransim is a ransomware simulator for with which simulates the attacks of ten ransomware families on your system.

The ransomware is no doubt a relatively new category of threats that has gained prominence in a very short space of time.Ransomware Simulator RanSim

Security companies have begun to release protection tools from ransomware, but no one knows whether they are effective, or how long they will stay as the malware code continually changes.

So RanSim is designed to simulate attacks on a computer system, which will help you find out if your system is protected by ten common ransomware attacks.

If you try to download Ransomware “RanSim” 1.0.2.2 from official webpage you will be prompted to sign up before receiving the download option. We downloaded it for you, and we uploaded it to GDrive. So you can download it without giving your details.

The developers of the app suggest keeping it security off as the simulation will look suspicious to him and may block RanSim. The new Premium Malwarebytes for example blocks the execution of RanSim actions.

RanSim is very easy to use. Provides information about the ransomware test scripts and just pressing one button you can start the test.

The test will not take more than a minute. The program will download the test files from the Internet but will not damage your files on the local system. It will list the files and display information about the vulnerabilities it discovered.

The application checks for the following ransomware:

  1. InsideCryptor - encrypts files using strong encryption and overwrites most of the content of the original files with the encrypted data.
  2. LockyVariant - simulates the behavior of a recent version of Locky ransomware.
  3. Mover - Encrypts files in a different folder using strong encryption and safely deletes the original files.
  4. Replacer - Replaces the content of the original files. A real ransomware would show a message that fools users into thinking they can recover them.
  5. Streamer - Encrypts files and writes data into a single file, using strong encryption, then deletes the original files.
  6. StrongCryptor - Encrypts files using strong encryption and safely deletes the original files.
  7. StrongCryptorFast - Encrypts files using strong encryption and deletes the original files.
  8. StrongCrytptorNet — Encrypts files using strong encryption and deletes the original files. It also simulates sending the encryption key to a server using an HTTP .
  9. ThorVariant - Simulates the behavior of a recent version of Thor ransomware.
  10. WeakCryptor - Encrypts files using weak encryption and deletes the original files.

RanSim after the end of the simulations lists the number of successful and failed attacks during the test.

Download the software

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.100 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).