PA File Sight can detect and protect against ransomware attacks using a variety of methods.
These include simple detection methods used by other products, as well as more advanced options. Once a ransomware attack is detected, the server is protected and information is shared with other servers so they are protected as well.
Ransomware Detection Techniques
Simple Detection - Honeypot
Some simple products create hidden folders with specific files that users should not touch. Anything that touches those files is considered a threat and alerted on. If the hackers that write the ransomware decide to not encrypt hidden files and folders, this detection method will fail. PA File Sight can support this simple method, but it also supports more robust detection methods.
Simple Detection - Filenames
Sometimes ransom notes with particular file names will be saved to the folder during a ransomware attack. Sometimes the files will be encrypted with a specific file extention (like Resume.docx.encrypted). Simple ransomware detectors watch for these cases, but this won't catch new variants of ransomware that come out later. PA File Sight supports this method, but it can also do better.
Robust Detection - Activity Monitoring
Ransomware attacks occur when a compromised client computer:
- Reads files from the server
- Saves the files back in an encrypted form
PA File Sight's advanced monitoring technology watches for a client computer doing reads and writes of many files in a short period of time, and runs alerts when the pattern is seen.
This feature is only available in the Ultra Edition. Compare Ultra vs Lite to see the differences.
The alerts can notify IT staff about the problem. PA File Sight can also actively protect the server.
Get a step-by-step guide for setting up ransomware detection and prevention.
Ransomware Server Protection
PA File Sight can block the client account so it cannot access any more files on the server using the Add to Blocked User List action. This will prevent the compromised client account from accessing files on the server, without affecting other legitimate users still using the server.
The Blocked Users List is actively shared among servers protected by the same PA File Sight installation, so other servers can be protected from the compromised client before it even attacks them.