As an experienced linux only user, i could have ignored the latest waves of crypto malware. But i’m also taking care of some people being forced to use Windows and Office and so on.
Can’t say enough:
If your happily using ZFS based sytems with high snapshot rate like me, you might be quite relaxed about backup because of read-only snapshots.
But i also want to get noticed, when some bogus I/O starts on these servers. I was playing arounf with inotify and custom scripts, which just extracts the filename extension and shout out loud, when there are lots of files having the same (unknown before) extension. Works. But also, i stumbled upon cryptostalker, which more or less does the same (ok, it checks for encrypted files ;) ).