forked from p15670423/monkey
Merge pull request #1265 from guardicore/ransomware-encryption-documentation
Add documentation for ransomware
This commit is contained in:
commit
33a6e72df5
|
@ -0,0 +1,118 @@
|
|||
---
|
||||
title: "Ransomware"
|
||||
date: 2021-06-23T18:13:59+05:30
|
||||
draft: true
|
||||
pre: '<i class="fas fa-lock"></i> '
|
||||
weight: 10
|
||||
---
|
||||
|
||||
The Infection Monkey has the capability of simulating a ransomware attack on your network.
|
||||
All actions performed by the encryption routine are designed to be safe for production
|
||||
environments.
|
||||
|
||||
To ensure minimum interference and easy recoverability, the ransomware simulation will encrypt
|
||||
files only if the user specifies a directory that contains files that are safe to encrypt.
|
||||
If no directory is specified, no files will be encrypted.
|
||||
|
||||
<!-- add config screenshot here -->
|
||||
|
||||
|
||||
## How are the files encrypted?
|
||||
|
||||
Files are "encrypted" in place with a simple bit flip. Encrypted files are renamed to have
|
||||
`.m0nk3y` appended to their names.
|
||||
|
||||
This is a safe way to simulate encryption since it is easy to "decrypt" your files. You can simply perform a bit flip on the files again and rename them to remove the appended `.m0nk3y` extension.
|
||||
|
||||
This is sufficient to mock a ransomware attack on your network as the data in your files has been manipulated (temporarily leaving them unusuable) and are renamed with a different extension, similar to the way that many ransomwares act. As this is a simulation, your security solutions should be triggered to notify and prevent these changes from taking place.
|
||||
|
||||
|
||||
## Which files are encrypted?
|
||||
|
||||
All regular files with [valid extensions](#file-extensions-targeted-for-encryption) in the configured directory are attempted to be encrypted during the simulation.
|
||||
|
||||
The simulation is not recursive, i.e. it will not touch any files in sub-directories of the configured directory. Symlinks and shortcuts are ignored.
|
||||
|
||||
These precautions are taken to prevent the monkey from going rogue and accidentally encrypting files that you didn't intend to encrypt.
|
||||
|
||||
|
||||
## File extensions targeted for encryption
|
||||
|
||||
Encryption attempts are only performed on regular files with the following extensions.
|
||||
|
||||
This list is based on the [analysis of the Goldeneye ransomware by BitDefender](https://labs.bitdefender.com/2017/07/a-technical-look-into-the-goldeneye-ransomware-attack/).
|
||||
|
||||
- .3ds
|
||||
- .7z
|
||||
- .accdb
|
||||
- .ai
|
||||
- .asp
|
||||
- .aspx
|
||||
- .avhd
|
||||
- .avi
|
||||
- .back
|
||||
- .bak
|
||||
- .c
|
||||
- .cfg
|
||||
- .conf
|
||||
- .cpp
|
||||
- .cs
|
||||
- .ctl
|
||||
- .dbf
|
||||
- .disk
|
||||
- .djvu
|
||||
- .doc
|
||||
- .docx
|
||||
- .dwg
|
||||
- .eml
|
||||
- .fdb
|
||||
- .giff
|
||||
- .gz
|
||||
- .h
|
||||
- .hdd
|
||||
- .jpg
|
||||
- .jpeg
|
||||
- .kdbx
|
||||
- .mail
|
||||
- .mdb
|
||||
- .mpg
|
||||
- .mpeg
|
||||
- .msg
|
||||
- .nrg
|
||||
- .ora
|
||||
- .ost
|
||||
- .ova
|
||||
- .ovf
|
||||
- .pdf
|
||||
- .php
|
||||
- .pmf
|
||||
- .png
|
||||
- .ppt
|
||||
- .pptx
|
||||
- .pst
|
||||
- .pvi
|
||||
- .py
|
||||
- .pyc
|
||||
- .rar
|
||||
- .rtf
|
||||
- .sln
|
||||
- .sql
|
||||
- .tar
|
||||
- .tiff
|
||||
- .txt
|
||||
- .vbox
|
||||
- .vbs
|
||||
- .vcb
|
||||
- .vdi
|
||||
- .vfd
|
||||
- .vmc
|
||||
- .vmdk
|
||||
- .vmsd
|
||||
- .vmx
|
||||
- .vsdx
|
||||
- .vsv
|
||||
- .work
|
||||
- .xls
|
||||
- .xlsx
|
||||
- .xvd
|
||||
- .zip
|
Loading…
Reference in New Issue