Skip to main content

Ransomware for Testing purpose

Project description

Build

Overview

I've tried searching ransomwares for testing in macos but most of them turned out to be shady. This one is different. I created it on my own and it replicates basic ransomware behaviour. The user has full control over which directories and which file-types to target.

After significant thinking about interruption during runtime of the ransomware and assessing the irreversible damages, I have added a few failsafes which might come in handy. One of them being The files being encrypted multiple times due to starting and stopping of the ransomware. In cases like these, the multiple encrypted files can also be recovered, which makes it significantly better than any other test ransomware I found online.

Note: As I mentioned earlier, this is made for macOS only as I have used Applescript and other macOS dependent features to make it replicate ransomware behaviour.

However, If you like it and want me to create one for your prefered operating system, create an issue here and I'd be happy to help. Do star the repo!

Table of Contents

Please Read all Disclaimer and Precautions before use.

Working

,_________________,       Monitors        ,____________,
| Kill Protection |-------->------>-------| Ransomware |
|     Program     |-------->------>-------|  Program   |
'-----------------'   Restarts if killed  '-----,------'
                                                |
                                                |
                    ,---------------------------'
                    | - For All Targeted Directories
                    | - Encrypts Targeted File Types
                    |
    ,--------,  ,---'----,      ,--------,
    |  Dir1  |  |  Dir2  | .... |  Dir n |
    '---,----'  '-,------'      '---,----'
        |         |                 |
,-------',  ,-----'--,        ,-----'--,
| File 1 |  | File 2 |  ..... | File n |
'--------'  '--------'        '--------'

Instruction of Usage

  • Installation

    pip install test-ransomware
    
  • Usage

    $ rw --help
    Test Ransomware v0.1.0
    author: Soumyo Deep Gupta (d33p0st, d33pster)
    description: Dummy Ransomware to test Prevention/Detection and similar techniques.
    
    Syntax: rw [OPTIONS]
    
    [OPTIONS]
    
    --start | -s            : This option starts the Kill Protection
                            program which then starts the Ransomware.
    
    --recover | -r          : This option recovers the affected files.
    
    --directories | -d      : This option helps select target directories.
                            [This is a mandatory option]
                            Example: rw --start --directories dir1 dir2 ...
    
    --types | -t            : This option helps select the target file types
                            [NOT mandatory. Accepts File Extensions]
                            Example: rw --start -d dir1 dir2 -t txt docx
    
    --help | -h             : shows this help text and exit.
    
    [Developer OPTIONS] (Use with precautions)
    
    --start-runtime | -sr   : starts ransomware directly.
    
    --rec | -rec            : recovers files directly.
    
  • Basic Examples

    # to start ransomware will kill protection and target jpg and jpeg files
    rw --directories ~/dir1 ~/dir2/dir3 --types jpg jpeg --start
    
    # to recover the files affected by the above code.
    rw --directories ~/dir1 ~/dir2/dir3 --types jpg jpeg --recover
    

Detailed Features

  • Base Ransomware

    The Ransomware scans and isolates the targeted files and replaces them with encrypted contents rendering them useless.

    After that step, It keeps on checking the encrypted file hashes and if some file change is detected (could be the user being successful in decrypting some file or simply changed the encrypted file either accidently or due to ill motive), the Ransomware again encrypts the changed file.

  • Kill Protection

    The Ransomware automatically restarts and re-encrypts the files.

    Note: Each time the ransomware quits due to any reason, it restarts and re-encrypts all the files.

  • Recovery

    No matter how many times a file is encrypted, The Test Ransomware will recover the original file.

  • Multiple Terminal Output

    Once you start the Ransomware, apart from the current terminal, other terminals will open to notify about files and statuses.

  • Faster than most

    The Ransomware is written in a python-rust mix leveraging rust's speed in time consuming tasks such as scanning for files and as such.

    Note: This provides an addition test vector for Detection Techniques.

Precautions

  • As I mentioned earlier, Repeated killing wont help preventing/Safe-Guarding from the Ransomware. As soon as the Ransomware re-encrypts the files, the file size increases and therefore repeated killing will only result in resource loss.

  • The Developer options are merely for testing and is not recommended to use.

  • Double-check directories and files before using the Ransomware. If by any chance, recovery fails, I am not responsible for any kind of damage.

  • It is recommended to use this software for educational pupose only. Any damages to property or data or resource in any form or usage in illegal activities will result in the user being liable.

Issues

Create any issues found during usage or suggestions or anything here.

Pull Requests

For any Modifications or changes or upgrades make sure you create a pull request here.

DISCLAIMER

THIS SOFTWARE IS PROVIDED FOR EDUCATIONAL AND RESEARCH PURPOSES ONLY. THE CREATOR DOES NOT CONDONE OR ENCOURAGE THE USE OF THIS SOFTWARE FOR ANY ILLEGAL OR MALICIOUS ACTIVITY.

BY USING THIS SOFTWARE, YOU ACKNOWLEDGE AND AGREE THAT:

  1. THE CREATOR SHALL NOT BE HELD RESPONSIBLE OR LIABLE for any damage, loss, or disruption caused by the use of this software. This includes but is not limited to damage to data, hardware, software, or other systems, whether used in testing, production, or otherwise.

  2. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, either express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and non-infringement. In no event shall the creator be liable for any claims, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.

  3. USERS OF THIS SOFTWARE ARE FULLY RESPONSIBLE for ensuring that they have all necessary permissions to use the software, especially in cases where it interacts with files, systems, or environments that do not belong to them.

  4. ANY USE OF THIS SOFTWARE IN VIOLATION OF LOCAL, STATE, NATIONAL, OR INTERNATIONAL LAW is strictly prohibited and is the sole responsibility of the user. The creator is not liable for any legal consequences that may arise from improper or unauthorized use of this software.

  5. BY USING OR DISTRIBUTING THIS SOFTWARE, YOU AGREE TO RELEASE THE CREATOR from any and all liability, claims, or damages arising from the use or misuse of the software, including any unauthorized distribution, modification, or reverse engineering of the software.


IMPORTANT: DO NOT USE THIS SOFTWARE IN PRODUCTION ENVIRONMENTS OR ON SYSTEMS THAT YOU DO NOT OWN WITHOUT EXPLICIT PERMISSION. ANY MALICIOUS USE OF THIS SOFTWARE IS STRICTLY PROHIBITED.


Project details


Release history Release notifications | RSS feed

This version

0.1

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

test_ransomware-0.1.tar.gz (15.3 kB view details)

Uploaded Source

Built Distribution

test_ransomware-0.1-cp312-cp312-macosx_11_0_arm64.whl (226.3 kB view details)

Uploaded CPython 3.12 macOS 11.0+ ARM64

File details

Details for the file test_ransomware-0.1.tar.gz.

File metadata

  • Download URL: test_ransomware-0.1.tar.gz
  • Upload date:
  • Size: 15.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.0 CPython/3.12.3

File hashes

Hashes for test_ransomware-0.1.tar.gz
Algorithm Hash digest
SHA256 75763e3cc8feecd1b57e6063fc06a569f839aa1692fb55b8c6289b55f6a75f4d
MD5 f8e95e05dfe13893b37d686fd0ae9a5f
BLAKE2b-256 fab41ae9ffcae539f0718284a10d5159bcd077aa28b999d5c45f3ff911562b06

See more details on using hashes here.

File details

Details for the file test_ransomware-0.1-cp312-cp312-macosx_11_0_arm64.whl.

File metadata

File hashes

Hashes for test_ransomware-0.1-cp312-cp312-macosx_11_0_arm64.whl
Algorithm Hash digest
SHA256 aab1cdb0bc254a7c557014e5ab62be1d6a1cd04291a8edfc4ac8a77fc08f4186
MD5 adba48a8c6e62a6c7b31c7a4c92397b9
BLAKE2b-256 bc34f8a14f2fcdce25ebedc4fe5fde575f324e2a14f04618f55b9e7f5a8b08f1

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page