• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • PowerTech AV Automatically Detects Ransomware Activity

    June 29, 2022 Alex Woodie

    IBM i shops that are concerned about ransomware attacks may be interested in a new release of PowerTech Antivirus from HelpSystems, which can automatically detect ransomware activity on the IBM i system and block it before it can cause damage. There’s also a nifty new “canary file” feature that will hopefully keep IBM i users from falling down the coal mine.

    PowerTech Antivirus, which formerly carried the Stand Guard Anti-Virus label, was originally developed by Bytware to detect and prevent viruses from infecting the IFS on IBM i. The software, which HelpSystems obtained in a 2008 acquisition, uses an IBM i port of McAfee’s Anti-Malware Engine, which is kept up to date on the latest malware circulating in the wild.

    As ransomware attacks proliferated, HelpSystems added new features to prevent ransomware from successfully encrypting data on the IFS. With the launch of Powertech AV version 8.05 earlier this year, HelpSystems bolstered the ransomware functionality with a couple of key capabilities.

    For starters, the software can now detect suspicious file activity on the system and automatically block the user profile associated with the activity. The software gives customers the option to specify the sensitivity of the detection engine on a scale of 1 to 100, where 1 is the least strict and 100 is completely locked down, according to Sandi Moore, principal security consultant with HelpSystems.

    “Someone who is renaming files, deleting files, encrypting files very rapidly — that is obviously going to hit a higher suspicion rate,” Moore said in a video on the new function posted to the HelpSystems website. “If you’re on a very low number, you’re going to have a really high tolerance for that activity.”

    Moore recommends that customers monitor how PowerTech AV’s ransomware detection functionality is working to dial in the sensitivity level, or to create exceptions for users that need to create, modify, delete, and encrypt files as part of their jobs. Admins can also specify the software to ignore certain directories.

    PowerTech AV 8.05 brings another compelling new ransomware function: canary files.

    Just like the canaries that miners used to lower into coal mines to detect hazardous gases, the canary file is designed to surreptitiously detect noxious users messing around on the IBM i where they shouldn’t be.

    Moore explained how it works:

    “With the canary file, if someone renames or deletes or tries to modify the canary file, they will be automatically blocked by the software,” she said. “The idea here is to create a file that looks really enticing to a bad guy . . . because they’re pretty sure that you’re going to pay ransom to get that file back. As soon as they try to do that encryption or that rename or that delete or modification, they will be blocked.”

    For example, the customer may create a canary file that resembles a customer master file, one of the most valuable files that an IBM i shop may have (and which is an obvious target for a cyber criminal). After creating the canary file, the PowerTech AV user can set the trap designed to ensnare hackers snooping around on their system.

    The software doesn’t modify the user profile at all, Moore said, but users are blocked from accessing data. If a legitimate user makes a mistake and gets tripped up by the canary file, the admin can quickly unblock the user with a few keystrokes.

    “We’re very excited to bring this functionality on top of the current ability to scan for and find ransomware that’s on the IBM i,” Moore said. “This gives us a little extra leg up where we’re able to detect activity that’s coming from an external source.”

    For more information on the new features, check out the release notes for PowerTech AV.

    RELATED STORIES

    Ransomware Epidemic Hits Epic Proportions, And IBM i Shops Take Notice

    One IBM i Shop’s Close Call With Ransomware

    Bytware Bought by Help/Systems and Audax

     

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: Bytware, HelpSystems, IBM i, IFS, PowerTech, PowerTech AV

    Sponsored by
    ARCAD Software

    Embrace VS Code for IBM i Development

    The IBM i development landscape is evolving with modern tools that enhance efficiency and collaboration. Ready to make the move to VS Code for IBM i?

    Watch this webinar where we showcase how VS Code can serve as a powerful editor for native IBM i code and explore the essential extensions that make it possible.

    In this session, you’ll discover:

    • How ARCAD’s integration with VS Code provides deep metadata insights, allowing developers to assess the impact of their changes upfront.
    • The role of Git in enabling seamless collaboration between developers using tools like SEU, RDi, and VS Code.
    • Powerful extensions for code quality, security, impact analysis, smart build, and automated RPG conversion to Free Form.
    • How non-IBM i developers can now contribute to IBM i projects without prior knowledge of its specifics, while ensuring full control over their changes.

    The future of IBM i development is here. Let ARCAD be your guide!

    Watch the replay now!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Infor Puts CM3 Project On Hold IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline

    Leave a Reply Cancel reply

TFH Volume: 32 Issue: 46

This Issue Sponsored By

  • Maxava
  • Racksquared
  • LaserVault
  • OCEAN User Group
  • Raz-Lee Security

Table of Contents

  • IBM Mulls Using DataMigrator as Cloud Warehouse Pipeline
  • PowerTech AV Automatically Detects Ransomware Activity
  • Infor Puts CM3 Project On Hold
  • Four Hundred Monitor, June 29
  • IBM i PTF Guide, Volume 24, Number 26

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • POWERUp 2025 –Your Source For IBM i 7.6 Information
  • Maxava Consulting Services Does More Than HA/DR Project Management – A Lot More
  • Guru: Creating An SQL Stored Procedure That Returns A Result Set
  • As I See It: At Any Cost
  • IBM i PTF Guide, Volume 27, Number 19
  • IBM Unveils Manzan, A New Open Source Event Monitor For IBM i
  • Say Goodbye To Downtime: Update Your Database Without Taking Your Business Offline
  • i-Rays Brings Observability To IBM i Performance Problems
  • Another Non-TR “Technology Refresh” Happens With IBM i TR6
  • IBM i PTF Guide, Volume 27, Number 18

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle