Skip to content

Latest commit

 

History

History
49 lines (39 loc) · 1.45 KB

README.md

File metadata and controls

49 lines (39 loc) · 1.45 KB

Ransomware meets loop

Ransomware encrypts all files and subfolder files in such as Pictures, Documents, and Videos so they cannot be accessed, to panic users.

What if the ransomware meets an endless subfolder ...

alt text

Build loop folder
  1. Open command prompt, go to test folder, e.g. C:\Temp
  2. Create a sub folder named mkdir !loop_for_ransomware
  3. run cd !loop_for_ransomware
  4. run mklink /d one ..\!loop_for_ransomware
  5. run mklink /d two ..\!loop_for_ransomware
  6. these 2 symbolic links form an endless loop, you can verify this by dir /s
Test
  1. Open command prompt, go to test folder, e.g. C:\Temp
  2. run for /R %x in (*.*) do ren "%x" *.test, to simulate "ransomware operation"
Result

You can see only the first level files in the parent folder is affected, the files under subfolder have no change, because the "ransomware operation" is looped in the subfolder of !loop_for_ransomware

P.S. Exclude this folder !loop_for_ransomware in the antivirus schedule scan and backup software
Reference

https://ss64.com/nt/mklink.html

ransomware simulation ransomware assessment eddie chu [email protected] anti-ransomware endpoint test infosec security cyber security cybersecurity incident response hacker antimalware anti-malware defense testing pentest penetration test Running wheel for Ransomware