Skip to main content
Infection Monkey graphic blue background

Can You Detect and Stop Lateral Movement?

Simulate a ransomware attack on your network to identify propagation paths and test your organization’s response.

Key benefits

Visualize attack surface

See just how far a breach can spread in your network if you were targeted today.

Evaluate your response

Discover how long it takes your security tools and teams to detect and remediate the attack.

Improve defenses

Take action to improve your ransomware protection strategy based on the new insights.

Ransomware

Features

• Encrypt user-specified files

• Leave a ransom note

• Highly configurable behaviors

• Safe for production environments

How it works

The Infection Monkey encrypts user-specified files using a fully reversible algorithm, leaving a ransom note behind.

Specify

Indicate the directory that contains files that are safe for the Monkey to attack.

Unleash

Release the Infection Monkey! It will attempt to reach the directory and encrypt your files.

Review

Analyze your results and adjust your ransomware defense strategy based on real insights from your unique environment.

Supported platforms

aws
Docker
Azure
Windows Server
Penguin

Use cases

Deploy the Infection Monkey

To match the pace of change in dynamic environments, you need a readily available tool that automates your security testing. By deploying the Infection Monkey as an ongoing testing solution, you can verify the security baseline of your network and achieve full network coverage.

Application updates

Run the Infection Monkey after every update to an application in your environment. This allows you to ensure you did not leave any windows open for attackers and to validate security controls.

Continuous security validation

Using the Infection Monkey continuously, and between normally scheduled pen tests, helps ensure your security controls are in place, configured properly, and able to detect and block a real-world attack.

Download the Infection Monkey

To download the Infection Monkey, please submit the form at right. We will provide you with the files and an installation guide.