Fortinet, Inc.
System and methods for detection of cryptoware
Last updated:
Abstract:
A computer implemented method for protecting data stored in at least one file from being overwritten by malicious code, comprises: monitoring at least one file stored in a storage device location to detect a request to perform an overwrite operation at least a portion of data of the at least one file; redirecting the overwrite operation to a memory location designated as safe for being overwritten; analyzing the overwrite operation at the memory location to identify an association with malicious code; and outputting an indication of an attempt to overwrite the at least one file by malicious code.
Status:
Grant
Type:
Utility
Filling date:
11 Dec 2017
Issue date:
8 Feb 2022