Dell products l.p. (20240346146). LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE) simplified abstract

From WikiPatents
Revision as of 02:16, 18 October 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE)

Organization Name

dell products l.p.

Inventor(s)

Ofir Ezrielev of Be’er Sheba (IL)

Yehiel Zohar of Sderot (IL)

Yevgeni Gehtman of Modi'in (IL)

Tomer Shachar of Beer-Sheva (IL)

Maxim Balin of Gan-Yavne (IL)

LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE) - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240346146 titled 'LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE)

The abstract of the patent application describes a method for detecting ransomware processes, taking snapshots of them, installing instances on honeypot systems, and receiving ransom demands from attackers.

  • Detect ransomware process at data storage site
  • Take snapshot of ransomware process
  • Install instance on honeypot system
  • Receive first ransom demand for data at storage site
  • Receive second ransom demand for data in honeypot system
  • Ransom for second demand is less than first demand
  • Receive private key after payment of second demand
  • Use private key to decrypt data at storage site

Potential Applications: - Cybersecurity - Data protection - Ransomware prevention

Problems Solved: - Detecting ransomware processes - Preventing data loss - Enhancing security measures

Benefits: - Improved data security - Early detection of ransomware - Minimized data loss risks

Commercial Applications: - Cybersecurity companies - Data storage providers - IT security firms

Questions about the Technology: 1. How does this method improve upon existing ransomware detection techniques? 2. What are the potential implications of using honeypot systems in cybersecurity?

Frequently Updated Research: - Ongoing studies on ransomware detection methods - Latest trends in cyber threats and data security.


Original Abstract Submitted

one method includes detecting, at a data storage site, a ransomware process, taking a snapshot of the ransomware process, using the snapshot to install an instance of the ransomware process on a honeypot system, receiving, from an attacker, a first demand for a ransom of data stored at the data storage site, and receiving, from the attacker, a second demand for a ransom of data stored in the honeypot system, and ransom of the second demand is less than the ransom of the first demand. a private key is received from the attacker after payment of the ransom of the second demand, but without payment of the ransom of the first demand, and the private key is then used to decrypt the data at the data storage site.