cryptostalker is a tool to detect and prevent crypto ransomware.

cryptostalker is a tool to detect and prevent crypto ransomware.

cryptostalker is to detect crypto ransomware. The mechanism it uses to do this is by recognizing new files that are created on the file system and trying to ascertain whether they are encrypted.

Tested systems
+ Linux
+ OSX
+ Windows

cryptostalker

How it works?
When cryptostalker runs, it places a recursive file system watch on the path specified with the –path command line flag.
Whenever a new file is created, it is inspected for randomness via the randumb library. If it is deemed random, and within the –window and –count parameters, a message will be output saying that a suspicious file is found. This is possibly indicative of a newly-placed encrypted file somewhere on the filesystem under the –path directory.

If the –stopAge command line flag is specified, any new process created within stopAge seconds of an encrypted file being detected will be terminated. The idea is to stop processes that might be responsible for performing the file encryption. This is a powerful, yet dangerous feature.
Ideally, suspicious processes will be issued an interrupt, so they’d just be paused, while the user or system log is notified and you can recover any legitimate processes. Due to a limitation in golang for Windows, an interrupt can’t be sent to processes; only a kill may be sent. When stopAge is implemented for other operating systems, it will be implemented with the interrupt functionality, not kill.

Usage and download from source:

Source: https://github.com/unixist