RanSim simulator ransomware: Are you safe?

Ransim is a simulator of Windows devices that simulates the attacks of ten ransomware families on your system.

The ransomware is no doubt a relatively new category of threats that has gained prominence in a very short space of time.Ransomware Simulator RanSim

Security companies have begun to release protection tools from ransomware, but no one knows whether they are effective, or how long they will stay as the malware code continually changes.

So RanSim is designed to simulate attacks on a computer system, which will help you find out if your system is protected by ten common ransomware attacks.

If you try to download Ransomware “RanSim” 1.0.2.2 from official webpage you will be asked to register before being given the option s. We downloaded it for you, and uploaded it to GDrive. So you can download it without giving your details.

Application developers suggest keeping your security software closed as the simulation will look suspicious and may block RanSim. The new Premium Malwarebytes for example blocks the execution of RanSim's actions.

RanSim is very easy to use. Provides information about the ransomware test scripts and just pressing one button you can start the test.

Η it won't take more than a minute. The program will download the test files from the Internet, but will not harm your files on the local system. It will list the files and display information about the vulnerabilities it discovered.

The application checks for the following ransomware:

  1. InsideCryptor — encrypts files using strong encryption and overwrites most of the of the original files with the encrypted data.
  2. LockyVariant - simulates the behavior of a recent version of Locky ransomware.
  3. Mover - Encrypts files in a different folder using strong encryption and safely deletes the original files.
  4. Replacer - Replaces the content of the original files. A real ransomware would show a message that fools users into thinking they can recover them.
  5. Streamer — Encrypts files and writes data into a file, using strong encryption, then deletes the original files.
  6. StrongCryptor - Encrypts files using strong encryption and safely deletes the original files.
  7. StrongCryptorFast - Encrypts files using strong encryption and deletes the original files.
  8. StrongCrytptorNet - Encrypts files using strong encryption and deletes the original files. It also simulates sending the encryption key to a server using an HTTP connection.
  9. ThorVariant - Simulates the behavior of a recent version of Thor ransomware.
  10. WeakCryptor - Encrypts files using weak encryption and deletes the original files.

RanSim after the end of the simulations lists the number of successful and failed attacks during the test.

Download the software

 

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.086 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).