Dell products l.p. (20240346146). LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE) simplified abstract
LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE)
Organization Name
Inventor(s)
Ofir Ezrielev of Be’er Sheba (IL)
Yevgeni Gehtman of Modi'in (IL)
Tomer Shachar of Beer-Sheva (IL)
LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE) - A simplified explanation of the abstract
This abstract first appeared for US patent application 20240346146 titled 'LOW-COST DATA DECRYPTION OF ADAPTIVE-PRICING RANSOMWARE WITH HONEYPOT (FOR ASYMMETRIC KEYS MALWARE)
The abstract of the patent application describes a method for detecting ransomware processes, taking snapshots of them, installing instances on honeypot systems, and receiving ransom demands from attackers.
- Detect ransomware process at data storage site
- Take snapshot of ransomware process
- Install instance on honeypot system
- Receive first ransom demand for data at storage site
- Receive second ransom demand for data in honeypot system
- Ransom for second demand is less than first demand
- Receive private key after payment of second demand
- Use private key to decrypt data at storage site
Potential Applications: - Cybersecurity - Data protection - Ransomware prevention
Problems Solved: - Detecting ransomware processes - Preventing data loss - Enhancing security measures
Benefits: - Improved data security - Early detection of ransomware - Minimized data loss risks
Commercial Applications: - Cybersecurity companies - Data storage providers - IT security firms
Questions about the Technology: 1. How does this method improve upon existing ransomware detection techniques? 2. What are the potential implications of using honeypot systems in cybersecurity?
Frequently Updated Research: - Ongoing studies on ransomware detection methods - Latest trends in cyber threats and data security.
Original Abstract Submitted
one method includes detecting, at a data storage site, a ransomware process, taking a snapshot of the ransomware process, using the snapshot to install an instance of the ransomware process on a honeypot system, receiving, from an attacker, a first demand for a ransom of data stored at the data storage site, and receiving, from the attacker, a second demand for a ransom of data stored in the honeypot system, and ransom of the second demand is less than the ransom of the first demand. a private key is received from the attacker after payment of the ransom of the second demand, but without payment of the ransom of the first demand, and the private key is then used to decrypt the data at the data storage site.