Alternative Ransomware Techniques featuring CTB-Faker

Ransomware samples are evolving at an accelerated rate, using alternative techniques that allow it to evade traditional defenses that rely on reputation to prevent malicious files. See how "non-malware" ransomware works and how to stop it.

CTB-Faker is a perfect example of how modern ransomware is leveraging these new techniques to easily evade traditional defenses.

Cb Defense uses file heuristics to expose evasive ransomware variants, including canary files that are benign files that act as bait to lure ransomware.