2021-06-23 22:15:43 +08:00
---
title: "Ransomware"
date: 2021-06-23T18:13:59+05:30
draft: true
pre: '< i class = "fas fa-lock" > < / i > '
weight: 10
---
The Infection Monkey has the capability of simulating a ransomware attack on your network.
2021-06-24 15:49:39 +08:00
All actions performed by the encryption routine are designed to be safe for production
environments.
2021-06-23 22:15:43 +08:00
2021-06-24 15:49:39 +08:00
To ensure minimum interference and easy recoverability, the ransomware simulation will encrypt
2021-06-25 18:30:49 +08:00
files only if the user specifies a directory that contains files that are safe to encrypt.
2021-06-24 15:49:39 +08:00
If no directory is specified, no files will be encrypted.
2021-06-23 22:15:43 +08:00
<!-- add config screenshot here -->
2021-06-24 17:11:38 +08:00
## How are the files encrypted?
Files are "encrypted" in place with a simple bit flip. Encrypted files are renamed to have
`.m0nk3y` appended to their names.
This is a safe way to simulate encryption since it is easy to "decrypt" your files. You can simply perform a bit flip on the files again and rename them to remove the appended `.m0nk3y` extension.
This is sufficient for a ransomware simulation as your files are unusuable and are renamed with a different extension, similar to how many ransomwares act. These changes should trigger your security solutions.
2021-06-23 22:15:43 +08:00
## Which files are encrypted?
All regular files with [relevant extensions ](#relevant-file-extensions-for-encryption ) in the
configured directory are attempted to be encrypted during the simulation.
The simulation is not recursive, i.e. it will not touch any files in sub-directories of the
2021-06-25 18:52:59 +08:00
configured directory. Symlinks and shortcuts are ignored.
2021-06-23 22:15:43 +08:00
2021-06-25 18:52:59 +08:00
These precautions are taken to prevent the monkey from going rogue and accidentally encrypting files that you didn't intend to encrypt.
2021-06-23 22:15:43 +08:00
## Relevant file extensions for encryption
Encryption attempts are only performed on regular files with the following extensions.
2021-06-24 15:49:39 +08:00
This list is based on the [analysis of the Goldeneye ransomware by BitDefender ](https://labs.bitdefender.com/2017/07/a-technical-look-into-the-goldeneye-ransomware-attack/ ).
2021-06-23 22:15:43 +08:00
- .3ds
- .7z
- .accdb
- .ai
- .asp
- .aspx
- .avhd
- .avi
- .back
- .bak
- .c
- .cfg
- .conf
- .cpp
- .cs
- .ctl
- .dbf
- .disk
- .djvu
- .doc
- .docx
- .dwg
- .eml
- .fdb
- .giff
- .gz
- .h
- .hdd
- .jpg
- .jpeg
- .kdbx
- .mail
- .mdb
- .mpg
- .mpeg
- .msg
- .nrg
- .ora
- .ost
- .ova
- .ovf
- .pdf
- .php
- .pmf
- .png
- .ppt
- .pptx
- .pst
- .pvi
- .py
- .pyc
- .rar
- .rtf
- .sln
- .sql
- .tar
- .tiff
- .txt
- .vbox
- .vbs
- .vcb
- .vdi
- .vfd
- .vmc
- .vmdk
- .vmsd
- .vmx
- .vsdx
- .vsv
- .work
- .xls
- .xlsx
- .xvd
- .zip