US 12,423,411 B2
Virtual file honey pots for computing systems behavior-based protection against ransomware attacks
Vladimir Strogov, Singapore (SG); Aliaksei Dodz, Singapore (SG); Oleg Ishanov, Singapore (SG); Serg Bell, Costa del Sol (SG); and Stanislav Protasov, Singapore (SG)
Assigned to Acronis International GmbH, Schaffhausen (CH)
Filed by Acronis International GmbH, Schaffhausen (CH)
Filed on Nov. 27, 2023, as Appl. No. 18/519,785.
Prior Publication US 2025/0173423 A1, May 29, 2025
Int. Cl. G06F 15/16 (2006.01); G06F 9/54 (2006.01); G06F 21/53 (2013.01); G06F 21/55 (2013.01); G06F 21/56 (2013.01); H04L 29/06 (2006.01)
CPC G06F 21/53 (2013.01) [G06F 21/552 (2013.01); G06F 21/566 (2013.01); G06F 2221/034 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for protecting a computing system (CS) against ransomware attacks using virtual file honeypots (VFHs) under virtual honeypot driver control, the method comprising: monitoring one or more operations on the CS; determining whether the one or more operations include any operations that are suspicious according to a policy; identifying a potentially malicious actor associated with the one or more operations that are suspicious; calculating a confidence level for the potentially malicious actor identification; collecting behavior information and characteristics of the potentially malicious actor, wherein characteristics include at least one of: a certificate; a hash of a file, a binary file, or a reputation; identifying at least one process or injected thread in a trusted process created by the potentially malicious actor on the CS; when the confidence level is above a predefined threshold, generating VFH security parameters by applying a machine learning module to at least one of: a CS environment information, behavior information of the potentially malicious actor, the characteristics of the potentially malicious actor, or auxiliary information; generating a plurality of VFHs based on the security parameters; providing the at least one process or injected thread in a trusted process with the plurality of VFHs mixed with real system files; and detecting the potentially malicious actor as malware by performing a heuristic analysis.