Fortinet, Inc.
System and methods for detection of cryptoware

Last updated:

Abstract:

A computer implemented method for protecting data stored in at least one file from being overwritten by malicious code, comprises: monitoring at least one file stored in a storage device location to detect a request to perform an overwrite operation at least a portion of data of the at least one file; redirecting the overwrite operation to a memory location designated as safe for being overwritten; analyzing the overwrite operation at the memory location to identify an association with malicious code; and outputting an indication of an attempt to overwrite the at least one file by malicious code.

Status:
Grant
Type:

Utility

Filling date:

11 Dec 2017

Issue date:

8 Feb 2022