ShieldFS can stop and reverse the effects of extortion code
Italian researchers have developed a custom drop-in driver and system file that can detect signs of ransomwrae infection, stop the malicious activity and even transfer the encrypted file to its original state. .
Named ShieldFS, the new project is the product of 7 researchers from Politecnico di Milano University and is provided with details at the Black Hat USA 2017 security conference.
ShieldFS acts as a COW scanner and encryption operation
According to research reports released this year, ShieldFS has a complex mechanism, designed to detect COW (Copy-On-Write) activities.
COW operation takes place when the application obtains the file, copies, modifies and replaces the original file. Most ransomware variants today rely on the COW mechanism by taking the first file, encrypting its content and replacing it with the original file.
ShieldFS not only detects COW activity but also seeks to use symmetric encryption patterns, commonly used in file encryption.
Once the activity is detected in this form, ShieldFS will check the internal behavior pattern, differentiate normal processes from the infected ransomware.
According to the researchers, ShieldFS is currently equipped with models adapted to 2245 legitimate applications, allowing it to work without causing too many errors that lead to legal blocking.
ShieldFS is used as a file system to recover encrypted files
If ransomware is detected, ShieldFS will tell the operating system to stop the process and use the customized system file to reverse the ransomware behavior.
ShieldFS project is expected to help fight extortion
Technically, this is possible because ShieldFS is packaged as a drop-in driver installed on a virtual system file, designed 'shadowed' on COW operation, to keep a copy of the original file in Short time and allow to restore a certain amount of files.
It can be said that ShieldFS's real-time self-healing system file is like a replacement for Shadow Volume copying, which most variations of ransomware guarantee to be deleted before encrypting the user's file, avoid recovering by specialized data recovery software.
Here's a video of how ShieldFS works. Researchers are still working on this project, saying they intend to officially release in the near future. This is the full report on ShieldFS at Black Hat.https://www.blackhat.com/docs/us-17/wednesday/us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems.pdf
You should read it
- Ransomware (ransomware) is showing signs of explosion worldwide, paying is no longer the most effective option.
- Lukitus Guide to preventing extortion malicious code
- Ryuk Ransomware has added 'selective' encryption capabilities.
- How to back up the EFS file encryption key and certificate in Windows 10
- Top 20 best encryption software for Windows
- File encryption software and privacy protection messages
- Ransomware can encrypt cloud data
- GIBON extortion code spread through spam
- New ransomware detection not only encrypts files but also helps 'clean up' the system
- Shade ransomware, the nightmare of 5 years ago is showing signs of returning
- How to encrypt files using File Guard
- Can data encryption protect you from Ransomware?
Maybe you are interested
You can still unlock your iPhone in iOS 17 even if you forget your password How to Unlock Disabled iPhone 20 tips and tricks for mastering Google Analytics data (Part 2) If you do not want to affect your hearing, keep these in mind when using headphones Top 10 best websites to find foreign friends learn English and exchange languages It turns out we are all misunderstanding the purpose of the keyboard leg