Italian security researchers at NECSTLab have developed a new project called “ShieldFS”, which is Windows drop-in driver and custom filesystem that is able to detect and recognize the signs of a ransomware attack, stop any malicious activities and can also return any encrypted files to the original state.
According to NECST:
“ShieldFS is an innovative solution to fight ransomware attacks. It automatically creates detection models that distinguish ransomware from benign processes at runtime on the base of the filesystem activity. “
It is a complicated mechanism created to detect Copy-On-Write (COW) processes. COW processes occur when an application uses a file, copies it, makes changes, and then replaces the original file. Most ransomware families depend on “COW” processes by using an initial file, encrypting its content, and replacing the original.
The project is also created to look for the use of symmetric crypto primitives, usually used in the file encryption process. Once ShieldFS identifies an event that meets these rules, it checks with internal behavioral models that distinguish benign processes from malicious ransomware.
“ShieldFS looks for indicators of the use of cryptographic primitives. In particular, ShieldFS scans the memory of any process considered as potentially malicious, searching for traces of the typical block cipher key schedules.”
Latest posts by Unallocated Author (see all)
- Your Ultimate Antivirus Software Guide - November 19, 2019
- 6 OSINT Tools That Make a Pentester’s Life Easier - November 18, 2019
- Cyber Security Threats to Consider in 2019 and Beyond - November 15, 2019