Developed by IONSec
RansomProtect is an open-source tool which identifies and blocks ransomware attacks early in the infection chain.
-
Clone the repository:
git clone https://github.com/ionsec/RansomProtect.git
-
Navigate to project's bin directory:
cd RansomProtect\bin
-
Execute the pre-built
ransom-protect.exe
To install RansomProtect, follow the steps below:
-
Clone the repository:
git clone https://github.com/ionsec/RansomProtect.git
-
Navigate to the project directory:
cd RansomProtect -
Install project's dependencies:
python3 -m venv venv venv\Scripts\activate.bat pip install -r requirements.txt
-
Install project'smodules (use -e to install in
devmode):pip install -e . -
Build
RansomProtectusing pyinstaller:pyinstaller --onefile --console src/main.py
This section explains the configuration parameters used by the application. The config file is divided into three sections: GENERAL, SPLUNK, and NETWORK.
NOTE: Make sure to modify the configuration values according to your environment before running the application.
[GENERAL]
TrapSensitivity = Low
TimeSensitivity = 10
Prefix = 0_ios_
Extensions = [".csv",".data",".docx",".mdb",".pem",".sql",".sqlite",".txt",".vmdk",".xlsx",".ini"]
Paths = ["C:/ProgramData", "Desktop","Documents"]
[SPLUNK]
Token = <TOKEN>
URL = https://localhost:8088/services/collector/event
Source = ransom_protect
[NETWORK]
Drop = TrueTrapSensitivity: Defines the sensitivity level for trapping suspicious activity. Possible values areLow,Medium, orHigh.TimeSensitivity: Sets the time window (in seconds) for detection. The default value here is10.Prefix: Aunique string that will be added as a prefix to all decoy files (e.g.,0_ios_).Extensions: A list of file extensions to use for decoy files.Paths: Specifies the decoy directories.
Token: Authentication token for the Splunk service. Replace<TOKEN>with your actual Splunk token.URL: The URL for sending events to Splunk’s HTTP Event Collector (HEC).Source: A custom source identifier for the Splunk logs, set asransom_protect.
Drop: Boolean flag (TrueorFalse) indicating whether network traffic should be dropped in case of suspicious activities. The default value isTrue.