Brand-New Ransomware Simulator Now With 21 Latest Infection Scenarios
s ransomware techniques continue to evolve, a newer ‘name-and-shame’ tactic is responsible for a significant increase in ransomware attacks this year. The bad guys continue to demand larger ransoms and are getting more insidious on how they target your organization and take advantage of vulnerable users.
The ‘name-and-shame’ ransomware gangs not only infect a user’s computer with file-encrypting malware and hold the files ransom; they also steal that data. Then, they threaten to publish the stolen and oftentimes sensitive data on the dark web unless you pay the ransom.
These cyber criminals have become highly sophisticated in their ways to shut your network down completely to ensure their ransom demands are met. That’s why we’ve updated our Ransomware Simulator tool “RanSim” to add another two new ransomware scenarios you can test on your network!
These new scenarios simulate two of the most popular ‘name-and-shame’ ransomware variants, Maze and DoppelPaymer. These types of ransomware infections exploit known security vulnerabilities in Windows, use vulnerable VPNs and remote desktop servers, and can easily bypass your endpoint security and AV filters.
Try KnowBe4’s NEW Ransomware Simulator tool and get a quick look at the effectiveness of your existing network protection against the latest threats. RanSim will simulate 20 ransomware infection scenarios and 1 cryptomining infection scenario to show you if a workstation is vulnerable to infection.
Here’s how RanSim works:
- 100% harmless simulation of real ransomware and crypto-mining infection scenarios
- Does not use any of your own files
- Tests 21 different types of infection scenarios
- Just download the install and run it
- Results in a few minutes!
Test 21 Infection Scenarios Now!