Since I found anything similar pre-built (with the exception of one script which requires powershell), I was about to start the development of a simple tool able to monitor changes on a set of files and take actions accordingly.
The question is: could a similar approach be useful in detecting and insulate a system affected by some sort of cryptoware/ransomware software?
I would build this software to accomplish this specific purpose, but since I'm a real newbie in the field of malware, I do not want to waste my time in something not useful - or already built!
Any comment is welcome, and of course the software will be OS licenced.
The question is: could a similar approach be useful in detecting and insulate a system affected by some sort of cryptoware/ransomware software?
I would build this software to accomplish this specific purpose, but since I'm a real newbie in the field of malware, I do not want to waste my time in something not useful - or already built!
Any comment is welcome, and of course the software will be OS licenced.