RansomFree - New anti-ransomware free program

I'd recommend it but...

http://www.ghacks.net/2016/12/20/ransomfree-protect-pc-ransomware/?_m=3n%2e0038%2e1950%2ehj0ao01hy5%2e213l

 

Well, it's free and is made to be a high level program for PCs running Windows 7, 8 and 10 (x32 and x64):

RansomFree needs to be installed on the target machine. The protection that it adds to the system is interesting, as it creates a number of files on the system that it monitors for changes.

These files use characters that place them at the top of the directory structure. The idea is that ransomware will parse for files using the same structure so that the created files will be targeted first by the attack.

The company behind the product believes that this is the best proactive way to detect ransomware on a PC at the earliest...Ransomfree places popular file formats, docx, doc, sql, xls and so on in the folder which are often targeted by ransomware attacks as they are - usually -- personal or work related." - gHacks

 

CyberReason state they've tested their software against forty known threats and it stops them cold. BleepingComputer (link below) confirmed this but with a more limited number of known threats. RansomFree isolates low level ASCI encrypted files and protects them and uses any changes being made to them as the alarm to have you cease their being accessed. They do this because: 

"Cybereason researched tens of thousands of ransomware variants belonging to over 40 ransomware strains, including Locky, Cryptowall, TeslaCrypt, Jigsaw and Cerber and identified the behavioral patterns that distinguish ransomware from legitimate applications. While each ransomware strain was written by different criminal teams, they all exhibit the same low-level file-related behavior. Ransomware attempts to encrypt as many files as possible, as quickly as possible.

Cybereason has developed a unique behavioral approach to stop ransomware in its tracks. Since we’ve identified the typical pattern of behavior, we know how and where ransomware will start encrypting files. We built this knowledge into RansomFree: a free, anti-ransomware software that detects and blocks ransomware.

By targeting the common behavior of ransomware, Cybereason RansomFree protects against 99 percent of ransomware strains. RansomFree detects ransomware, suspends the activity, displays a popup that warns users that their files are at risk and lets the user stop the attack with one click.

RansomFree protects against local encryption as well as the encryption of files on network or shared drives. The encryption of shared files is among the doomsday scenarios an organization can imagine. It takes only one employee on the network to execute ransomware and affect the entire company.

RansomFree catches stand-alone ransomware programs as well as fileless ransomware. Stand-alone ransomware uses vulnerabilities in applications, like buggy Flash code, but fileless ransomware abuses legitimate Windows tools, like the PowerShell scripting language or JavaScript, to carry out its malicious intentions." - CyberReason

The problems are 1) 99%, not 100% because their behavior isn't 100% consistent and 2) It will only be a matter of time before the ransomware programmers adopt a different approach from the one being protected against.

Still, it's better than nothing, but folks, configure your firewall correctly as a first step: https://technet.microsoft.com/en-us/library/cc700820.aspx 

As gHacks put it: 

"It is best to complement anti-ransomware tools with other means including backup creation and resident security solutions such as a properly configured firewall." - gHacks

CyberReason's homepage: https://ransomfree.cybereason.com/

 

Sources:

http://www.ghacks.net/2016/12/20/ransomfree-protect-pc-ransomware/?_m=3n%2e0038%2e1950%2ehj0ao01hy5%2e213l

https://ransomfree.cybereason.com/ (also the download page (in the top banner)

https://www.cybereason.com/blog-cybereason-ransomfree-protecting-your-data-from-being-held-hostage/

https://technet.microsoft.com/en-us/library/cc700820.aspx

https://msdn.microsoft.com/en-us/library/cc875811.aspx

 

 

221,473 views 35 replies
Reply #1 Top

Looks like a worthwhile proggy...;)

Reply #2 Top

Thanks, Doc.... trying it out now.  I avoid things normally associated with ransomware delivery and etc, but still, it is much better to be safe than sorry.

:)

Reply #3 Top

Welcome, Mark. Hope it prevents something truly bad.

Reply #4 Top

I've been using it since your post Doc,  It has already updated once, so that suggest to me that they are quite possibly staying ahead of the curve when it comes to bad actors trying to side-step it's protection.

-- Ace --

Reply #5 Top

Quoting AceMatrix, reply 4

I've been using it since your post Doc,  It has already updated once, so that suggest to me that they are quite possibly staying ahead of the curve when it comes to bad actors trying to side-step it's protection.

-- Ace --

 

Ditto ...;)

Reply #6 Top

Thanks, Doc, for your post.  I'm trying it out too.  One of my wife's friends recently got hit by one of those, she had to ask her son to reformat and reinstall everything.

Reply #7 Top

Trying it now - thanks for the info :)

Reply #8 Top

Quoting Fuzzy, reply 7

Trying it now - thanks for the info :)

Reply #9 Top

Quoting DrJBHL, reply 3

Welcome, Mark. Hope it prevents something truly bad.

Same here, and not just for me.

Sadly, it's not software that's capable of sending a bolt of lightning right back to the creators of these vile things.

Reply #10 Top

Hello! I'm new here and it may be wrong thread, but still I want to ask you if there is any way to recover files after this merry_i_love_you_bruce ransomware attack? I've already tried to use ShadowExplorer but no luck for me.

So I'd be very thankful for any help!

Reply #11 Top

Quoting StillmissYou, reply 10

Hello! I'm new here and it may be wrong thread, but still I want to ask you if there is any way to recover files after Osiris ransomware attack? I've already tried to use ShadowExplorer but no luck for me.

So I'd be very thankful for any help!

 

ShadowExplorer is only useful to explore 'shadow copies' of files.  Of course that only worked to recover data until the ransomware dudes got smart enough to encrypt and/or delete those copies as well.  Sorry to say if you've been hit by one of the newer iterations, you're likely out of luck.

Reply #12 Top

Quoting StillmissYou, reply 10

Hello! I'm new here and it may be wrong thread, but still I want to ask you if there is any way to recover files after Osiris ransomware attack? I've already tried to use ShadowExplorer but no luck for me.

So I'd be very thankful for any help!

 

My advice is join the forums at BleepingComputer.com - they have very knowledgeable people there who can help with ransomware.  They may know of a free decrypter that can be used to recover your data.  Determine that first before removing the infection.  If there is a free decrypter then clean the machine with MalwareBytes AntiMalware and recover your data.

https://www.bleepingcomputer.com/forums/

Reply #13 Top

An update to this program now places two hidden folders on every internal partition.  The folders contain files with misleading extensions, such as a jpg which isn't a jpg, txt which isn't a txt file, etc..  They also have strange names such as friendship-insect-invite-repeat.docx.  IIf you delete the folders they will reappear.  I just spent three hours chasing down what I thought was a virus!  A readme file explaining the contents odf each folder would have saved me a lot of time.

Reply #14 Top

Quoting gevansmd, reply 13

An update to this program now places two hidden folders on every internal partition.  The folders contain files with misleading extensions, such as a jpg which isn't a jpg, txt which isn't a txt file, etc..  They also have strange names such as friendship-insect-invite-repeat.docx.  IIf you delete the folders they will reappear.  I just spent three hours chasing down what I thought was a virus!  A readme file explaining the contents odf each folder would have saved me a lot of time.

You should also have a few icons on the desktop with titles such as 'do not delete me....' explaining what they are...and I believe the website explains it....and there's a RTFM somewhere too...;)

Those folders and items inside are monitored by the proggy looking for signs of ransom attack....being at the beginning of a folder tree means they get hit first...and thus no genuine file of yours gets hit before the proggy has a chance to react...;)

Reply #15 Top

It appears to change the 'bait' folder and file names intermittently and randomly, also, so it could easily raise an eyebrow if one hadn't checked the documentation.  So far, it seems quite unobtrusive otherwise.

Reply #16 Top

Quoting gevansmd, reply 13

 IIf you delete the folders they will reappear.

Found that out when I tried to delete them, thinking the same thing. Then I realized why they were there. 

Reply #17 Top

Quoting Jafo, reply 14


Quoting gevansmd,

An update to this program now places two hidden folders on every internal partition.  The folders contain files with misleading extensions, such as a jpg which isn't a jpg, txt which isn't a txt file, etc..  They also have strange names such as friendship-insect-invite-repeat.docx.  IIf you delete the folders they will reappear.  I just spent three hours chasing down what I thought was a virus!  A readme file explaining the contents odf each folder would have saved me a lot of time.



You should also have a few icons on the desktop with titles such as 'do not delete me....' explaining what they are...and I believe the website explains it....and there's a RTFM somewhere too...;)

Those folders and items inside are monitored by the proggy looking for signs of ransom attack....being at the beginning of a folder tree means they get hit first...and thus no genuine file of yours gets hit before the proggy has a chance to react...;)

 

I don't have the desktop icons.  And I eventually figured out they were bait files because they are the types of files that ransomware would attack.  Since I didn't know the folders were created by this software I had no reason to check their website for an explanation.  It was only when I started shutting down starup aps that I found the problem.

Reply #18 Top

Quoting gevansmd, reply 17

I don't have the desktop icons.  And I eventually figured out they were bait files because they are the types of files that ransomware would attack.  Since I didn't know the folders were created by this software I had no reason to check their website for an explanation.  It was only when I started shutting down starup aps that I found the problem.

The trick is that whenever you add a new proggy...no matter from whose suggestion it comes [even Doc's] the trick is to investigate first....check it out online before checking it out as a download/install.

Knowledge is power....;)

[just ask MS....Google....et al]

Reply #19 Top

Folders were not hidden for me.

Reply #20 Top

Quoting S, reply 19

Folders were not hidden for me.

 

They are visible on my boot drive but hidden on drives D and E.  Ther are not on my external drive.

Reply #21 Top

I see them on all drives.

 

Thought they we supposed to be hidden.

Reply #22 Top

None are hidden here.  From their website Q&A:

Cybereason RansomFree watches the way applications interact with files, and when it detects ransomware behavior, it stops it immediately before the files are encrypted. Cybereason RansomFree uses pure behavioral detection techniques and does not rely on malware signatures.

Cybereason RansomFree deploys bait files strategically placed where ransomware often begins its encryption. The solution watches the way applications interact with files, and when it detects ransomware behavior, it stops it immediately before the files are encrypted.

Cybereason RansomFree uses pure behavioral detection techniques and does not rely on malware signatures.

Can't find anything on their site indicating whether the folders/files should or should not be hidden.

Reply #23 Top

I'm thinking not. I opened file explorer and then on folder options, unchecked show hidden files and folders, applied it and closed. The files are still there. I then reset it. Si I guess they stay visible but they have the look of hidden files and folders. 

Reply #24 Top

Quoting S, reply 21

I see them on all drives.

Same here.  Thing is, I think if you leave 'Show Hidden Files' unchecked they wouldn't be visible.  I have those files visible so that I can see 'Program Data' and other files at a glance when needed.  However, I may just uncheck it so I'm not hunting through irrelevant folders on my storage and other drives... like some drives have collected quite a few since I installed RansomFree.

And like several others, I wondered what they were and why they were there.  I didn't take long to figure it out, though.  In reading some program documentation I soon found out why I suddenly had mysterious folders all over the place.. they were/are the bait files placed there by RansomFree.

:)

Reply #25 Top

Ya think the bait is juicy enough?

Just asking.  *_*