Ransomware
Can You Detect and Stop Lateral Movement?
Simulate a ransomware attack on your network to identify propagation paths and test your organization’s response.
Key Benefits
Visualize attack surface
See just how far a breach can spread in your network if you were targeted today.
Evaluate your response
Discover how long it takes your security tools and teams to detect and remediate the attack.
Improve defenses
Take action to improve your ransomware protection strategy based on the new insights.
Features
- Encrypt user-specified files
- Leave a ransom note
- Highly-configurable behaviors
- Safe for production environments
How it works
The Infection Monkey encrypts user-specified files using a fully reversible algorithm, leaving a ransom note behind.
- You specify the directory that contains files safe for the Monkey to attack.
- You unleash the Infection Monkey! It will attempt to reach the directory and encrypt your files.
- You review your results and adjust your ransomware defense strategy based on real insights from your unique environment.
For more information
Supported Platforms:
