How to test anti-ransomware: This is how we do it (2024)

How to test anti-ransomware: This is how we do it (1)

Ransomware may not make the headlines quite as often as it did in the past, but it hasn’t gone away. In December 2018, for instance, a new threat apparently created by a single hacker managed to infect at least 100,000 computers in China, encrypting files, stealing passwords and generally trashing users’ systems.

Antivirus companies like to claim they'll keep you safe, with vague but impressive sounding talk about 'multi-layered protection', 'sophisticated behavior monitoring' and the new big thing: 'machine learning'. But do they really deliver?

The easiest way to get an idea is to check the latest reports from the independent testing labs. AV-Comparatives Real-World Protection Tests and AV-Test's reports are an invaluable way to compare the accuracy and reliability of the top antivirus engines, for instance.

The problem is that the test reports only give you a very general indicator of performance with malware as a whole. They won't tell you how an engine performs specifically with ransomware, how quickly it can respond, how many files you might lose before a threat is stopped, and other nuances. That's exactly the sort of information we really want to know, and that's why we've devised our own anti-ransomware test.

How to test anti-ransomware: This is how we do it (2)

Ransomware simulator

It's possible to test anti-ransomware software by pitting it against known real-world threats, but the results aren't often very useful. Typically, the antivirus will detect the threat by its file signature, ensuring it never reaches any specialist anti-ransomware layer.

What we decided to do, instead, was write our own custom ransomware simulator. This would act very much like regular ransomware, spidering through a folder tree, detecting common user files and documents and encrypting them. But because we had developed it, we could be sure that any given antivirus package wouldn't be able to detect our simulator from the file alone. We would be testing its behavior monitoring only.

There are weaknesses with this concept. Most obviously, using our own simple, unsophisticated code would never provide as effective or reliable an indicator as using real undiscovered ransomware samples for each review.

Are you a pro? Subscribe to our newsletter

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

But there are plus points, too. Using different real-world ransomware for one-off reviews means some anti-ransomware packages might be faced with very simple and basic threats, while others got truly dangerous and stealthy examples, depending on what we could find at review time. Running our own simulator means every anti-ransomware engine would be measured against the same code, giving every package a fair and equal chance of success.

How to test anti-ransomware: This is how we do it (3)

What we look for

Our test procedure is simple. Once we've set up the test environment (copying the user documents to their various folders), we check the anti-ransomware package is working, minimize it, launch the simulator, and wait.

That's where it begins to get interesting, because this isn't just a pass/fail situation. These are the issues we consider when weighing up how successful an anti-ransomware package has been.

The first and most fundamental step is that the ransomware simulator must have its process killed, limiting the number of files that will be damaged.

Detection must happen quickly, because the longer the delay, the more files will be lost. We count the number of encrypted files to assess effectiveness.

How to test anti-ransomware: This is how we do it (4)

The best anti-ransomware packages will recover at least some, and usually all damaged files, ensuring you don't lose any data at all. If this happens, we compare the recovered files with the originals to confirm they're fully restored.

The ransomware simulator should have its executable deleted, quarantined, or otherwise locked away from user access. (Sounds obvious, but not every package does this).

The user should ideally be informed that a threat has been detected and dealt with, allowing them to inspect the damage.

Finally, an anti-ransomware product can earn bonus points for any extra clean-up steps it takes (deleting ransomware notes, say), and any further help it can give the user, for example offering to initiate a deep antivirus scan to help try and find any associated dangers.

Our ransomware simulator may appear to be a simple test, then, but by revealing how individual packages react, it tells us a great deal about their effectiveness, and how useful they're likely to be.

How to test anti-ransomware: This is how we do it (5)

Interpreting the test results

Although many anti-ransomware packages successfully block our simulator, many don't. A test fail can seem like a disaster, but it needs to be interpreted with care.

If a package can't detect our simulator, for instance, that doesn't necessarily mean it won't block undiscovered real-world ransomware. AV-Comparatives, AV-Test and other labs regularly show that most vendors can detect the huge majority of undiscovered threats from their behavior alone. The packages we are testing are proven to work very well, and our simple test doesn't change that.

It's worth keeping in mind that anti-ransomware (and all antivirus software) is forever walking a fine line between blocking all genuine threats, while never touching legitimate software. There are archiving and security applications which might work their way through a folder tree, processing and apparently encrypting files, and it's possible a 'failed' anti-ransomware package has recognized our simulator, weighed up many factors and decided it isn't a threat.

For example, the anti-ransomware software might look for files which have been downloaded recently, have a recent date, are packed executables (compressed, making it harder to view the contents), aren't signed, have dubious URLs or Bitcoin references embedded, and that look for various antivirus packages, along with other suspect signs.

Perhaps the anti-ransomware is scoring our simulator so low on this threat index that it assumes it's legitimate and allows the test to run, even though its actions are very ransomware-like.

How to test anti-ransomware: This is how we do it (6)

Without knowing the precise reason for an anti-ransomware's failure to detect our simulator, we can't condemn it outright. It's taking a risk by allowing the simulator to run, but this isn't strong evidence that the software can't detect real-world threats. We don't read anything major into it, and neither should you.

The real value of our simulator test comes almost entirely from looking at the passes. If an anti-ransomware package detects our test threat, that first tell us it's more cautious about what it allows to run. But what's most important is how well it handles that threat, and protects your data.

If an anti-ransomware package misses our simulator, then, we could say that's a very small black mark (or maybe a light gray mark). But detecting and blocking the simulator is a big plus, and doing that in a way which prevents any data loss – recovering encrypted files, for instance – while keeping you up-to-date with informative alerts, indicates top-of-the-range technology which should also protect you well against real-world threats.

  • Check out our list of the best antivirus
How to test anti-ransomware: This is how we do it (7)

Mike Williams

Lead security reviewer

Mike is a lead security reviewer at Future, where he stress-tests VPNs, antivirus and more to find out which services are sure to keep you safe, and which are best avoided. Mike began his career as a lead software developer in the engineering world, where his creations were used by big-name companies from Rolls Royce to British Nuclear Fuels and British Aerospace. The early PC viruses caught Mike's attention, and he developed an interest in analyzing malware, and learning the low-level technical details of how Windows and network security work under the hood.

More about security

Is your VPN collecting your data?Millions of email servers could be at risk from Exim security flaw

Latest

Looking to snag a future-proof gaming laptop? Save $1,000 on the Razer Blade 15 with this early Amazon Prime Day deal
See more latest►

Most Popular
Lenovo quietly debuts Apple Mac Studio competitor with AI-enabled ThinkCenter Neo Ultra mini PC — but misses a trick by using only Intel Core processors
NYT Strands today — hints, answers and spangram for Sunday, July 14 (game #133)
NYT Connections today — hints and answers for Sunday, July 14 (game #399)
Quordle today – hints and answers for Sunday, July 14 (game #902)
Living in the past much? Security advice for US colleges warns on ancient iconic file-sharing systems — such as Kazaa and LimeWire
First it was Japan — now the German navy is also stamping out floppy disks for good
Overclocked mini PC powered by AMD may well be the fastest in its category — Metaphyuni Genesis Cube supports up to 80W TDP, has two LAN ports, can drive four 4K displays and has an OCuLink connector
The Samsung Galaxy Z Flip 6 is rumored to be getting a key upgrade that will please pro photographers
NAS PC built by little-known Chinese vendor reminds me of the uber popular HP Proliant Microserver N54L — but it is capable of so much more
The Samsung Galaxy S25 Ultra is rumored to be changing shape to be more comfortable to hold
Demon Slayer season 4: Release date, trailer, confirmed cast, plot synopsis, and more
How to test anti-ransomware: This is how we do it (2024)
Top Articles
Sams Club Gas Station Price
Familie adoptiert Hund von Craigslist und entdeckt ihre tragische Vergangenheit | 2024
Devotion Showtimes Near Xscape Theatres Blankenbaker 16
Craigslist Myrtle Beach Motorcycles For Sale By Owner
Skyward Sinton
Play FETCH GAMES for Free!
Napa Autocare Locator
Teamexpress Login
Bustle Daily Horoscope
Uc Santa Cruz Events
Regular Clear vs Low Iron Glass for Shower Doors
ATV Blue Book - Values & Used Prices
What Is Njvpdi
Shemal Cartoon
Transfer Credits Uncc
Eka Vore Portal
Video shows two planes collide while taxiing at airport | CNN
1v1.LOL - Play Free Online | Spatial
Unterwegs im autonomen Freightliner Cascadia: Finger weg, jetzt fahre ich!
Wausau Obits Legacy
Curry Ford Accident Today
20 Different Cat Sounds and What They Mean
Christina Steele And Nathaniel Hadley Novel
Curver wasmanden kopen? | Lage prijs
MLB power rankings: Red-hot Chicago Cubs power into September, NL wild-card race
Skip The Games Fairbanks Alaska
Orange Pill 44 291
Mtr-18W120S150-Ul
Conscious Cloud Dispensary Photos
Understanding Gestalt Principles: Definition and Examples
Malluvilla In Malayalam Movies Download
Danielle Ranslow Obituary
Bolly2Tolly Maari 2
The Powers Below Drop Rate
Christmas Days Away
Taktube Irani
Hattie Bartons Brownie Recipe
Maybe Meant To Be Chapter 43
Nacho Libre Baptized Gif
Raisya Crow on LinkedIn: Breckie Hill Shower Video viral Cucumber Leaks VIDEO Click to watch full…
19 Best Seafood Restaurants in San Antonio - The Texas Tasty
Winco Money Order Hours
Wayne State Academica Login
The Attleboro Sun Chronicle Obituaries
Sound Of Freedom Showtimes Near Amc Mountainside 10
Pgecom
Bmp 202 Blue Round Pill
Kjccc Sports
The Many Faces of the Craigslist Killer
Madden 23 Can't Hire Offensive Coordinator
Phumikhmer 2022
Palmyra Authentic Mediterranean Cuisine مطعم أبو سمرة
Latest Posts
Article information

Author: Moshe Kshlerin

Last Updated:

Views: 6415

Rating: 4.7 / 5 (57 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Moshe Kshlerin

Birthday: 1994-01-25

Address: Suite 609 315 Lupita Unions, Ronnieburgh, MI 62697

Phone: +2424755286529

Job: District Education Designer

Hobby: Yoga, Gunsmithing, Singing, 3D printing, Nordic skating, Soapmaking, Juggling

Introduction: My name is Moshe Kshlerin, I am a gleaming, attractive, outstanding, pleasant, delightful, outstanding, famous person who loves writing and wants to share my knowledge and understanding with you.