Welcome to the official repository for the implementation of methods and algorithms presented in our research paper:
📄 Hiding in the Crowd: Ransomware Protection by Adopting Camouflage and Hiding Strategy With the Link File
- 📌 Authors: Soohan Lee et al.
- 📌 Published in: IEEE ACCESS
- 🔗 Read the Full Paper Here
The main idea: Most ransomware does not target system files like .exe or .dll, or system file directories (e.g., Program Files, Windows). By camouflaging files with these types of extensions and hiding them in system file directories, we can safeguard valuable data from ransomware attacks in a cost-effective manner.
To solve usability challenges, we use Windows shortcut files (a.k.a. link files) to provide seamless access to hidden files.
-
Install uv
powershell -ExecutionPolicy ByPass -c "irm https://astral.sh/uv/install.ps1 | iex"
-
Verify application paths in app_path.json
-
Ensure the application paths specified in
app_path.jsonare correct, especially for commercial software like Microsoft Word, Excel, PowerPoint, and Adobe Acrobat. -
To set up our default environment, install MS Office, Adobe Acrobat, and 7-Zip, or configure
app_path.jsonwith your preferred applications. -
Alternatively, you can remove any application entries from
app_path.jsonif you do not need to support them.
-
-
Build the project
powershell -exec bypass -f install.ps1
-
(Optional) Set up Windows context menu for quick access to file hiding and recovery (Run as Administrator)
Set-RightClick.bat
-
The executables are built in the
distdirectory. -
Make sure that
hiding.exe,linker.exe,recovery.exeare in the dist directory.cd dist
-
Hiding Files (Run as Administrator):
-
Hide all files from the testbed directory (for proof-of-concept purpose)
hiding.exe --testbed
By default, in the proof-of-concept, all hidden files are stored in the following directory:
C:\\Windows\\Help\\Windows\\IndexStore\\en-US. -
Hide a specific file (or you can just right-click the file and select
'Hide File')hiding.exe --file_path [filename]
-
-
Recovery:
-
Recover all hidden files
recovery.exe --all
-
Recover a specific hidden file (or you can just right-click the shortcut and select
'Recover File (Extract File)')recovery.exe --file_hash [hash]
-
-
Recover all hidden files
recovery.exe --all
-
Remove file hiding and recovery options from the Windows context menu (Run as Administrator)
Remove-RightClick.bat
This project is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License (CC BY-NC-SA 4.0).
- This source code may be used for academic, educational, and research purposes only.
- You are free to share and adapt this project for non-commercial purposes.
- If you modify or build upon this project, you must share your contributions under the same license (CC BY-NC-SA 4.0).
- You must give appropriate credit to the original work.
For more details, please see the LICENSE file or visit the official license page.