Ransomware Simulator

[vc_row height=”auto” color_scheme=”secondary” sticky=”1″][vc_column][us_additional_menu source=”4″ layout=”hor” responsive_width=”” main_style=”blocks” main_gap=”” main_color_bg=”” main_color_bg_active=”#1e8dcc” main_color_text_active=”#fff” align=”center”][/vc_column][/vc_row][vc_row][vc_column width=”1/6″][/vc_column][vc_column width=”2/3″][vc_column_text]

Simulate Ransomware on Your Network

[/vc_column_text][vc_column_text]

There is really no shortcut for testing your network against a ransomware attack. The only way to know how protected you are, is to test your defenses against real ransomware. We developed a ransomware simulator that will encrypt data on the network, but in a way that’s under your control, has an off switch, and allows you to decrypt the data as well.

[/vc_column_text][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row height=”small” color_scheme=”alternate” gap=”17.5px” columns_type=”boxes”][vc_column width=”1/6″][/vc_column][vc_column css=”%7B%22default%22%3A%7B%22background-color%22%3A%22%23ffffff%22%7D%7D” width=”2/3″][vc_column_text]

PowerShell Encrypter/Decrypter

[/vc_column_text][vc_column_text]This PowerShell script will do exactly what ransomware does, encrypt files. This is the only way to truly know if you are protected.

WARNING: This tool encrypts files. Please use responsibly. If you are unfamiliar with PowerShell DO NOT use this tool.[/vc_column_text][vc_row_inner][vc_column_inner width=”1/2″][us_btn label=”Learn More” link=”url:https%3A%2F%2Fwww.getcryptostopper.com%2Fblog%2Fransomware-simulator-script%2F” style=”13″ align=”center” icon=”fas|external-link-alt” css=”%7B%22default%22%3A%7B%22font-size%22%3A%2215px%22%7D%7D” custom_width=”200px”][/vc_column_inner][vc_column_inner width=”1/2″][us_btn label=”Request a test” link=”url:https%3A%2F%2Fwww.getcryptostopper.com%2Fransomware-simulator%2Frequest-a-test” style=”6″ align=”center” icon=”fas|download” iconpos=”right” css=”%7B%22default%22%3A%7B%22font-size%22%3A%2215px%22%7D%7D” custom_width=”200px”][/vc_column_inner][/vc_row_inner][us_separator size=”large”][us_image image=”632″][us_separator][vc_column_text]We have written two PowerShell scripts which act as the ransomware simulator. One script encrypts the data, and the other script decrypts the data using a public/private key pair. We created these as a tool, so that you can test your defenses against actual ransomware. The purpose of the decrypter is to ensure that your files aren’t permanently destroyed.

  • The network drives are enumerated and sorted in descending order.
  • The lowest drive letter will be attacked. This gives you the ability to control what shares are affected. In our testing environments, we use the drive letter Z as our ‘attack’ drive.
  • All files are discovered. Only files are discovered, folders are excluded.
  • Each file is encrypted with the Public key of our certificate. You will need a certificate for this to work and we’ve included all of the necessary steps below.
  • After all the files have been encrypted, the script exits.

[/vc_column_text][/vc_column][vc_column width=”1/6″][/vc_column][/vc_row][vc_row height=”auto” width=”full”][vc_column][us_cta title=”Are you protected?” controls=”bottom” btn_label=”Learn more about CryptoStopper™” btn_link=”url:%2Ffeatures” btn_style=”9″ btn_size=”15px”]Protect your network from the inside-out. Prevent your valuable data from becoming completely exposed to cyber criminals.[/us_cta][/vc_column][/vc_row]