Ranstop anti-ransomware stops WannaCryptor v2 – TEMASOFT Lab Demo

Case subject: WannaCryptor(WannaCry) v2 – (Virustotal details) Following up on the massive WannaCrypt attack, we have tested TEMASOFT Ranstop against several variants and recorded the test against the newest version- WannaCryptor v2. This version still spreads via email campaigns and combines the ransomware payload with worm spreading capabilities, but it uses a different command and […]

Wanna Cry ransomware reveals the limits of the current security systems

The world is in shock after the most damaging ransomware attack in history, and many people ask how this is possible and what’s next. How the attack was possible and who is affected At TEMASOFT we’ve investigated the attack, and the results show the ransomware itself is not very different from typical ransomware if we look […]

What is ransomware, and why is it so damaging for businesses?

Ransomware is a type of malware that aims to extort money from companies by disrupting their activities. The most widespread type of ransomware targets data and renders information or computer systems unusable until a ransom is paid. When business-critical information gets locked up, most businesses seriously consider paying ransoms to recover it. In many cases, however, paying […]

28 Years of Cyber Extortion: From Floppy Disk to Cloud

Cyber extortion has been around for nearly three decades, and the general feeling you get when reading the news nowadays is that the world is not yet prepared to deal with it. Although sustained efforts have been made to combat ransomware, the primary tool for cyber extortion, many businesses and institutions still fall victim to […]

TEMASOFT Ranstop in Reviews

TEMASOFT Ranstop is a successful combination of anti-ransomware and smart, real-time backup technologies, with a unique approach to combating the ransomware threats. While the detection capabilities, based on file access patterns and in-memory correlations, provide protection against old and new threats, the backup engine acts like a safe net, making sure that the files are […]

A glimpse on how we test Ranstop (the human approach)

Temasoft Labs is a particular mixture between humans and machines, very similar to a microbiology laboratory. They both do the same thing, search and analyze disease-causing microorganisms because this is the first step in fighting this particular type of infectious agent: ransomware. Just like their biological counterparts, ransomware attacks IT infrastructure of any kind and […]

The New Security Features in Windows Creators Update and Their Impact on Ransomware Protection

There are multiple resources online that discuss the new features in the Windows Creators Update to various degrees of detail. Some of them focus on the security piece, a significant update from the previous version. We are going to focus on how the new security features help combat ransomware, one of the goals of our […]

Ranstop anti-ransomware defends against over-the-network attack by Satana ransomware – Temasoft Lab Demo

Case subject – A Satana variant (Virustotal details) In this scenario, the ransomware attack comes over the network via mapped drives. There are two computers involved: one running the Satana variant, without any protection installed and having a mapped drive to the second computer; the second computer does not run any ransomware code and has […]

Ranstop anti-ransomware protects files against a “RAA” variant – Temasoft Lab Demo

Case subject – A “RAA” variant (JavaScript-based) (Virustotal details) This live ransomware test focuses on a RAA variant to determine how effective TEMASOFT Ranstop is at tackling elusive JavaScript-based ransomware. The RAA ransomware variants have been around since mid-2016, but it still manages to elude a good number of anti-virus engines. It gets delivered to […]

Ranstop protects files against the “.Osiris” variant of Locky – Temasoft Lab Demo

Case subject – A Locky variant nicknamed “.Osiris” (Virustotal details) For this test, the TEMASOFT Research Lab Team let loose one of the latest Locky variants, which features many improvements regarding speed, obfuscation, and strength of the cryptography. The malware uses multiple processes to ensure coverage for as many files as possible and usually gets […]