HitmanPro.Alert Review: Free Ransomware Protection & Browser Intrusion Detection Tool


  1. I’m going to give this a try as not even Comodo Dragon having Bitdefender phishing detector extension warned me about a link to a site which a colleague in antimalware research had found infected with Cryptolocker; the site probably has been cleaned by now, but not when I Googled its link…a European Netflix-type site; needless to say, I didn’t feel lucky enough to see if my otherwise very tough security layers would also be fooled by any Cryptolocker attack!

    Hard though it may be, don’t pay ANY ransoms even to Cryptolocker; if many do pay, it’ll only encourage even more development/deployment of such scumware. I can add only that if Cryptolocker gets on a system, it can be manually neutralized by most antimalware techs/proficient users, then removed by say Malwarebytes; if any files are still encrypted, you can try using a restore point (actually, works better if you have apps like ShadowExplorer working if you have a VSS-enabled OS), or you can try right-clicking an affected file, going to Properties, and seeing if it has previous versions and if so thus revert the file to a useable state.

    Thanks for the tip on HitmanPro!

  2. Thanks for the info about “Hitman Pro” Andy I will download and install it to test it on one of my PC’s before installing on the others. If it does a says then this will be a [another] worthwhile security program to have. More so if it can catchwarn about the likes of cryptolocker.

    Thanks for the info regarding cryptolocker [possible] repairfix

  3. You and all on earth are always welcome, when it comes to tips against malware as I find new ones. BTW, I’ve had this Hitman product on a Windows 7 Home Premium SP1 64 bit since my original comment, and so far OS/security apps/everything else has no conflicts as yet, and the Hitman Pro app does seem capable of blocking Cryptolocker (use a competent AV updated scanner to remove if Hitman blocks it).

  4. EDIT: I forgot to mention that working on basic/home premium is important, in that many ransomware blockers require the group policy editor feature to do their blocking (they watch gpe objects, and basic/home premium don’t have gpe). It appears HitMan Pro’s blocker is object-agnostic, instead simply looking at what is being attempted with ANY file, period. If anyone has problems running Hitman’s beta, the only other free ransomware blocker not using gpe I know of is “CryptoPrevent” by Foolish IT; free version has to be manually updated, its paid version auto-updates, but please know I myself haven’t used it nor have I seen tests on it.

  5. Dan

    I have downloaded and installed CryptoPrevent. It was straight forward installation without any extras or hassles. The Premiumversion (special offer of under £10.00 in UK) thus enabling me to get auto updates for it.

    When first installed there are 3 boxes out of 4 pre-selected

    “Protect %appdata% –

    fake file extension executables – &

    whitelist exe’s

    The one not selected by default is

    “block temp extracted executables’ in archive files”

    but easy to select this as well for maximum security.


  6. Would it be worthwhile to install both Hitman-pro-alert and CryptoPrevent?
    I guess also have Malwarebytes sfw with a good anti-virus installed…

  7. Joe
    I don’t know if it is possible to run both together or not but I have now been running CryptoPrevent for the past 6 – 7 days and there is no slowdown on system[s] (installed on 3 PC’s). As for just how secureeffective it is I will not know unless I get hit [which is something I don’t really want to test out :-)]. So no [visible] activity, I suppose, is a good sign. It does not [seem] to interfere with other security programs either.

  8. So, given the choice between HitmanPro.Alert and CryptPrevent, as it’s apparent there is no need for both, which is the choice.

    All of my systems run either Professional or Enterprise versions of Windows.

    I have deployed CryptoPrevent and AVG Cloud Care (content filtering) at client offices, I am also considering switching them to OpenDNS as another layer of precaution. The three together should be sufficient in prevention, in my humble opinion.

Leave a Reply

Your email address will not be published. Required fields are marked *

9 + 4 =