US20230132303A1 - System for blocking a ransomware attack - Google Patents
System for blocking a ransomware attack Download PDFInfo
- Publication number
- US20230132303A1 US20230132303A1 US18/086,716 US202218086716A US2023132303A1 US 20230132303 A1 US20230132303 A1 US 20230132303A1 US 202218086716 A US202218086716 A US 202218086716A US 2023132303 A1 US2023132303 A1 US 2023132303A1
- Authority
- US
- United States
- Prior art keywords
- backup
- data
- storage device
- server
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/80—Database-specific techniques
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/825—Indexing scheme relating to error detection, to error correction, and to monitoring the problem or solution involving locking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
Definitions
- the present invention relates to a method and a system for blocking a ransomware or phishing attack.
- the phishing refers to an attack that seizes account information or electronic certificates, key data, and the like existing in a user terminal due to attacks that leak data stored in the user terminal.
- the ransomware is an attack technique that requires money after encrypting the data stored in the user terminal or kept in a connected network storage so as to prevent a user from accessing the data.
- the present invention has been made in an effort to solve the above-described problems associated with prior art and to provide a method and a system for blocking a ransomware attack for a server capable of safely managing data stored in the server and backup data from ransomware by a low-price and easy method without separate server manager.
- Another object of the present invention is to provide a method and a system blocking a phishing attack from the outside to lose data of a user terminal or a service server.
- a system for blocking a ransomware attack as a system for a server for blocking a ransomware attack
- a backup storage device which has a purpose for backing up the stored data in a server as a separate storage device which is physically independent from the server and includes a communication interface to enable a communication access to the server; and a service agent which is installed in the server to mediate the communication with the backup storage device, wherein while the backup storage device is storage-mounted on the server, after the data backup to the backup storage device for the storage data in the server is performed, when there is the lock command for the backup data backed up in the backup storage device, the backup storage device locks the corresponding backup data according to the lock command to process the locked backup data to be provided only in an uncorrectable read-only mode.
- the data backup to the backup storage device may be processed only when the backup command for the storage data in the server is made, and when the service agent transmits the backup command received to the server to the backup storage device and the backup storage device may back up the corresponding storage data according to the received backup command.
- the backup storage device may confirm whether target data of the data correction command relates to the locked backup data, and when the target data is confirmed as the data correction command for the locked backup data, the backup storage device may reject the corresponding data correction command.
- the backup storage device may reject the data correction command for the corresponding backup data received from the different storage device and process the corresponding backup data to be provided only in the read-only mode.
- the backup storage device may include a hardware switch or a software switch for unlocking the locked state set in the backup data, and even in the case where the unlock command for the locked backup data is transmitted through the service agent, when switching to the unlocked state is not performed through an operating switching of the hardware switch or the software switch, the unlock command may be rejected.
- the backup storage device may release the read-only mode for the backup data according to the locked state to switch the corresponding backup data into a data correctable state.
- the switching to the unlocked state may select any one of a batch unlock mode performed for the entire backup data in the backup storage device and a selective unlock mode performed only for the requested backup data.
- a system for blocking a phishing attack comprising: a phishing attack prevention storage device; and an agent program which is installed in a user terminal or a service server and performs an interworking operation with the phishing attack prevention storage device when the user terminal or the service server is connected with the phishing attack prevention storage device via a network and a storage area in the phishing attack prevention storage device is mounted in a network drive form.
- the phishing attack prevention storage device may check a storage operation mode and create a fake file other than the open-requested original file when the storage operation mode corresponds to a list-only mode to return the fake file to the user terminal or the service server.
- the fake file may have the same file capacity as an original file to be open-requested, and a file text may be filled with a null value or an unknown value.
- the agent program may provide selection information to enable a user to select switching to an edit mode or termination of the edit mode with respect to a folder or file stored in the phishing attack prevention storage device mounted on the user terminal or the service server in a network drive format, and request a release of the list-only mode to the phishing attack prevention storage device when the file open request corresponds to an edit mode open request according to the switching to the edit mode.
- the phishing attack prevention storage device may release the list-only mode according to the edit mode open request and allow the open-requested original file to be provided to the user terminal or the service server.
- the agent program may request a release of the list-only mode to the phishing attack prevention storage device when there is a release request of the list-only mode according to a pre-registered mode from the user terminal or the service server.
- the phishing attack prevention storage device may allow the open-requested original file to be provided to the user terminal or the service server according to the release request of the list-only mode.
- the release of the list-only mode may be executed through an authority's authentication by an authentication device pre-registered from the user.
- a storage device for phishing prevention which is operable in a list-only mode according to a security policy as a separate storage device which is connected with the user terminal or the service server via a network, but is physically independent.
- FIG. 1 is a diagram showing a process of storage-mounting a backup storage device on a server in a system for a server for blocking a ransomware attack according to an embodiment of the present invention
- FIG. 2 is a diagram showing a process of backing-up and locking the data by the backup storage device in the system for the server for blocking the ransomware attack according to the embodiment of the present invention
- FIG. 3 is a diagram showing a process of releasing the lock by the backup storage device in the system for the server for blocking the ransomware attack according to the embodiment of the present invention
- FIG. 4 is a diagram for describing a list-only mode as a basic process according to a method and a system for preventing a phishing attack according to an embodiment of the present invention
- FIG. 5 is a diagram for describing a method for opening a file in an editable state by releasing the list-only mode according to an embodiment of the present invention
- FIG. 6 is a diagram for describing a method for performing additional authentication in the process of releasing the list-only mode according to an embodiment of the present invention
- FIG. 7 is a screen example for a case where a user switches a specific file to ‘edit mode open’ or ‘edit mode switching’ after mounting a storage space of a storage device for preventing a phishing attack in a window explorer in a network drive;
- FIG. 8 is an execution screen example capable of transmitting an edit mode termination command when the edit mode of FIG. 7 is released.
- FIGS. 1 to 3 a system for a server for blocking a ransomware attack will be described (see FIGS. 1 to 3 ).
- program-based read-only storage is a technology in which when whether the program is a program authorized on a file protection policy is determined, if there is the authorized program, the correction of the file is enabled, and if not, the program operates only in a read-only mode.
- a program-based read-only storage implementation method since commands and responses are basically performed by a file unit, a read-only file is provided by a file unit.
- a program-based read-only storage implementation method has the following weak points.
- the file creation time-based read-only storage implementation method in some cases, the following security vulnerability is shown. That is, although a file having a small size (capacity) of the file uploaded in the file creation process is not a problem, in the case of a backup of a file having a large size, the file creation effective time range needs to be increased, but if the time is opened too long, a possibility to be exposed to an external attack may be increased for the time. For example, in the case of the backup, in order to enhance the storage efficiency, the large-sized file is not backed up by one file unit, but is bound and backed up into one file with a Tar or ZIP format, and if the file size is too large, a correctable time of the file needs to be sufficiently much given.
- a “command-based read-only storage” implementation method is provided.
- Such a command-based read-only storage implementation method is executed by a backup command, a lock command, and an unlock command, and at this time, the backup/lock/unlock may be operated by a file unit and may be operated by a folder unit. Accordingly, even in the case where there is a correction request for a specific file, when a folder (extended to a higher folder of the corresponding folder) storing the corresponding file is in a locked state according to a path of the corresponding file, the correction request for the corresponding file is rejected.
- These backup/lock/unlock commands may use a command structure in accordance with the following commands by the Linux operating system.
- OTP one-time password
- the backup data may be changed into a read-only mode by locking all files and folders below a specific folder by a very simple console command.
- the command-based read-only storage implementation method generally, when the file is required to a mounted drive, a folder path storing the file is included in the corresponding request.
- a correction request is limited based on the file and the folder path, there is an advantage of omitting management for unnecessary metadata for each file (a difference between the creation time and a current request time in the case of the creation time-based read-only storage implementation method described above, and attribution information, a fingerprint value, etc. of the corresponding program in the case of the program-based read-only storage implementation method described above).
- a system for blocking a ransomware attack includes a backup storage device (see “mega storage” of FIGS. 1 to 3 , same as below) which has a purpose for backing up the stored data in a server as a separate storage device which is physically independent from the server and includes a communication interface to enable a communication access to the server; and a service agent (see “mega connector” of FIGS. 1 to 3 , same as below) which is installed in the server to mediate the communication with the backup storage device.
- a backup storage device see “mega storage” of FIGS. 1 to 3 , same as below
- a service agent see “mega connector” of FIGS. 1 to 3 , same as below
- the backup storage device provides the same environment as a general storage which is connectable via a network or directly. That is, like a general storage connected by NAS, DAS, SAN, etc., the backup storage device provides mount/unmount and provides an I/O of an operating system as it is so that there is no problem when various backup utilities and tools such as rsync are operated.
- a service agent may be installed to be driven in a service level of the operating system in the installation step or driven at any location by registering a program execution environment pass of the operating system.
- the backup storage device while the backup storage device is storage-mounted on the server, after the data backup to the backup storage device for the storage data in the server is performed, when there is the lock command for the backup data backed up in the backup storage device, the backup storage device locks the corresponding backup data according to the lock command to process the locked backup data to be provided only in an uncorrectable read-only mode.
- the data backup to the backup storage device may be processed only when the backup command for the storage data in the server is made, and when the service agent transmits the backup command received to the server to the backup storage device and the backup storage device may back up the corresponding storage data according to the received backup command.
- FIG. 1 is a diagram showing a process of storage-mounting a backup storage device on a server in a system for a server for blocking a ransomware attack according to an embodiment of the present invention.
- the backup storage device refers to a device or server device in which an actual storage device is built-in and a hybrid WORM program is mounted, and the service agent (mega connector) is a module installed in a customer service server to communicate with the backup storage device (mega storage).
- a user needs to mount the backup storage device (mega storage) to back up the data of its own service server.
- a mount request of the user is received and processed by the service agent (mega connector), and various I/Os of the operating system related to a storage mount are processed through the backup storage device (mega storage) and then the service agent (mega connector) returns the result to the operating system.
- FIG. 1 an example in which the backup storage device (mega storage) is mounted on a new folder called backup below a folder called /media.
- the backup storage device (mega storage) is mounted on a new folder called backup below a folder called /media.
- FIG. 2 is a diagram showing a process of backing up and locking data by the backup storage device.
- the backup storage device when the data correction command received from the server is transmitted from the service agent, the backup storage device confirms whether target data of the data correction command relates to the locked backup data, and when the target data is confirmed as the data correction command for the locked backup data, the backup storage device rejects the corresponding data correction command.
- the backup storage device (mega storage) locks the corresponding folder and thereafter, operates only in a read-only mode (see FIGS. 2 B and 2 C ).
- the folder of /media/backup/websource/20180101 may be created with a command such as mkdir in the case of the Linux operating system.
- information on the locked folders may be stored in a non-volatile memory (such as a database, etc.) of the backup storage device (mega storage), and thus the data may be maintained even if the power supply to the backup storage device is interrupted.
- a non-volatile memory such as a database, etc.
- the data correction requests (e.g., a write file, a modify file, a move file, a delete file, etc.) for /media/backup/websource/20180101 all are rejected by the user or any processor including ransomware.
- the backup storage device rejects the data correction command for the corresponding backup data received from the different storage device and may process the corresponding backup data to be provided only in the read-only mode.
- information on the locked folders is set to a storage reference path (/websource/20180101 in an example of FIG. 1 ) of the backup storage device (mega storage), and even though the backup storage device is mounted on another path (e.g., /media/data) of another device, /media/data/websource/20180101 may still be implemented accessibly only in the read-only mode.
- FIG. 3 is a diagram showing a process of performing the unlocking by the backup storage device.
- the backup storage device may include a hardware switch (e.g., a hardware button for locking and unlocking provided in the backup storage device) or a software switch for unlocking the locked state set in the backup data. Accordingly, even in the case where the unlock command for the locked backup data is transmitted through the service agent, when switching to the unlocked state is not performed through an operating switching of the hardware switch or the software switch, the unlock command may be rejected (see FIG. 3 D ).
- a hardware switch e.g., a hardware button for locking and unlocking provided in the backup storage device
- a software switch for unlocking the locked state set in the backup data. Accordingly, even in the case where the unlock command for the locked backup data is transmitted through the service agent, when switching to the unlocked state is not performed through an operating switching of the hardware switch or the software switch, the unlock command may be rejected (see FIG. 3 D ).
- the backup storage device releases the read-only mode for the backup data according to the locked state to switch the backup data into a data correctable state (see FIGS. 3 E and 3 F ).
- the switching to the unlocked state is able to select any one of a batch unlock mode performed for the entire backup data in the backup storage device and a selective unlock mode performed only for the requested backup data.
- the present invention basically, once-locked folders and files and folders therebelow are accessible only in the read-only mode and may be implemented so that any unlocking is impossible by the user.
- a writable area of the backup storage device (mega storage) is continuously decreased.
- an unlocking function is given to reuse the storage, and in the backup storage device (mega storage) of the present invention, the unlocking is performed by an operation of turning off the hardware switch (physical switch (protect switch)) or the software switch.
- the corresponding switch the protect switch
- a specific folder is able to be unlocked or the entire backup storage device (mega storage) is able to be unlocked.
- an on/off mode that is, lock and unlock
- OTP one time password
- the locking of the backup storage device may be performed by a mode executed (that is, changed to a read-only mode) only when a pre-specified lock command (ex. a lock command using a freeze command) needs to be input manually , but may be automatically executed according to a predetermined condition.
- a pre-specified lock command (ex. a lock command using a freeze command) needs to be input manually , but may be automatically executed according to a predetermined condition.
- a C function creating an I/O event closing a file handle according to the Linux/Unix OS, a C function below may be representatively used.
- the I/O event closing the file handle occurs, and the event is transmitted to a file system.
- the I/O may be detected by a callback file system (file system driver), and in the Linux, the I/O may be detected by FUSE.
- file handles forcibly opened by the OS are closed, and at this time, the same event I/O occurs.
- the functions described above are functions used in the C language, and functions closing the file handle are present separately for each language.
- the corresponding functions generate events to close the file handle to all file systems.
- the method for only reading or not the data stored in the backup storage device by a folder unit by the on/off selection using the hardware switch and the like is mainly described.
- a method of automatically changing the data to the read-only mode by detecting the termination event of the file is adopted, and while the hardware switch or the like is turned on, even in the case where there is an initialization command of the corresponding disk, a method in which the initialization of the disk is not operated may also be applied.
- FIGS. 4 to 8 As a second technical object of the present invention, a system for blocking a phishing attack will be described (see FIGS. 4 to 8 ).
- the method for storing the files separately in the security storage area and the method of allowing the file edition only by the authorized program have a weak point of extorting and simultaneously neutralizing an admin account of the operating system.
- the hacker watches the corresponding input/output commands and then extorts a fingerprint value and the like of the authorized program and performs a replay attack (that is, an attack in which a hacking program is the same name as the authorized program and disguised like a normal program by transmitting the extorted fingerprint value to the backup server) to neutralize a security mode of the above technology.
- the method is strong to the ransomware attack, but the data is able to be leaked by a method of capturing contents of the files opened in the read-only mode, and thus there is a possibility to be neutralized to the phishing attack.
- a method capable of improving the weak points described above and preventing the data leakage by the phishing attack by using a separate storage device hereinafter, referred to as a phishing attack prevention storage device
- a phishing attack prevention storage device basically operating as a “list-only mode” and physically independent.
- FIG. 4 is a diagram for describing a list-only mode as a basic process according to a method and a system for preventing a phishing attack according to an embodiment of the present invention.
- the file explorer executes a basic program (e.g., a basic program WINWORD.EXE to process an extension docx) to process the corresponding file extension and then transmits file information.
- the basic program is transmitted to the phishing attack prevention storage device (hereinafter, referred to as a filing box mini device) through an agent program (hereinafter, referred to as a filing box mini application or requesting a file read by the operating system and operating as a file system driver.
- the filing box mini device checks a list-only mode of the requested file to return fake data (in the case of the list-only mode) and provide the fake data to the basic program. Accordingly, the user finally watches document having the fake data or confirms errors generated by the basic program due to the fake data.
- the fake file has the same file capacity as an original file to be open-requested, and a file text may be filled with a null value or an unknown value which cannot determine any meanings.
- FIG. 5 is a diagram for describing a method for opening a file in an editable state by releasing the list-only mode according to an embodiment of the present invention.
- the file explorer After the user selects a specific file in the file explorer, the user clicks a right-side mouse button to pop-up a context menu of a shell extension of the file explorer. Thereafter, when the user selects a menu of ‘open to edit mode’, the file explorer requests a list-only mode release of the corresponding file to the filing box mini application and the filing box mini application allows the request to be performed to the filing box mini device.
- the file explorer executes the basic program to process the extension of the corresponding file and then transmits the file information, and the basic program reads and processes the original data from the filing box mini device through the operating system and the filing box mini application.
- FIG. 6 is a diagram for describing a method for performing additional authentication in the process of releasing the list-only mode according to an embodiment of the present invention.
- the user needs to first register a user's own OTP device (a mobile, etc.) to the filing box mini device once.
- the user requests a device registration together with user's own ID through the filing box mini application and the filing box mini device receiving the request requests creation and registration of a new TOTP parameter to be used in the corresponding user's ID to an internal device authentication unit. Normally, the TOTP parameter registered in the device authentication unit is transmitted to the filing box mini application to be exposed to the user.
- the initial OTP device registration process is completed.
- the filing box mini application inquires an authentication policy from the filing box mini device to recognize that the OTP authentication is required and requests a TOTP value to the user.
- the user obtains the TOTP value from the user's own OTP device to provide the obtained TOTP value to the filing box mini device and the filing box mini device receiving the value requests the authentication to the internal device authentication unit.
- the filing box mini device releases the list-only mode of the corresponding file to change the file to a usable state.
- FIG. 7 is a screen example for a case where a user switches a specific file to ‘edit mode open’ or ‘edit mode switching’ after mounting a storage space of a storage device for preventing a phishing attack in a window explorer in a network drive
- FIG. 8 is an execution screen example capable of transmitting an edit mode termination command when the edit mode of FIG. 7 is released.
- processing such as the switching to the edit mode or/and the termination of the edit mode may also be performed per unit file, but in some cases, the processing such as the switching to the edit mode or/and the termination of the edit mode may be simultaneously performed in a plurality of files within a required range or a set range in driving the file.
- the processing such as the switching to the edit mode or/and the termination of the edit mode may be simultaneously performed in a plurality of files within a required range or a set range in driving the file.
- reference files having sub folders need to be simultaneously accessed and used as in the case of CAD or a software development tool, even by switching to the edit mode/termination manipulation of the edit mode for any one file, all corresponding sub folders or reference files in the sub folder associated therewith will be enabled to be switched to the edit mode/ended.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Quality & Reliability (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
Abstract
Provided is a system for blocking a phishing attack including a phishing attack prevention storage device, and an agent program which is installed in a user terminal or a service server and performs an interworking operation with the phishing attack prevention storage device when the user terminal or the service server is connected with the phishing attack prevention storage device via a network. According to the embodiment of the present invention, when there is an open request for the file stored in the phishing attack prevention storage device from the user terminal or the service server, the phishing attack prevention storage device may check a storage operation mode and create a fake file other than the open-requested original file when the storage operation mode corresponds to a list-only mode to return the fake file to the user terminal or the service server.
Description
- The present invention relates to a method and a system for blocking a ransomware or phishing attack.
- As phishing and Ransomware distributed by hackers become more and more diverse, users' data are increasingly threatened. Generally, the phishing refers to an attack that seizes account information or electronic certificates, key data, and the like existing in a user terminal due to attacks that leak data stored in the user terminal. Further, the ransomware is an attack technique that requires money after encrypting the data stored in the user terminal or kept in a connected network storage so as to prevent a user from accessing the data. In recent years, there have been various methods and forms of preventing the user from using a PC terminal by manipulating a disk partition of the terminal from preventing the user from using the data after leaking the data.
- As the existing method for coping with the phishing attack, a technique that verifies whether a process that encrypts a storage space in a PC and accesses a corresponding specific storage space is a predetermined process is used, but even though the corresponding storage space is encrypted, there is a case where a file constituting the encrypted storage space is taken and decoded.
- In addition, as a conventional method to cope with the ransomware attack, there is a method that brings and uses the backed up data even though the PC is infected with the ransomware by periodically backing up the data in the PC to a safe storage area. However, even with this method, there is a problem that the loss of the file that has been recently worked can not be avoided. As another conventional method, there is a method that registers a process of accessing a file server in advance and enables only a process authorized in the PC to access the data, so as to make the data accessible only to the authorized process in the PC to block, when a process which is not registered in advance accesses the data, the process, thereby preventing a ransomware process from accessing the data. However, this method inconveniences registration of the authorized process in advance, and when a program is installed from time to time, there is also a limit in which the process can not be cumbersome to register every time.
- In recent years, there is even a case where the ransomware itself does not encrypt only the data stored in the PC, but encrypts the entire PC or encrypts the entire disk mounted on the PC to require ransom money. Therefore, there is a situation that it is no longer sufficient only by preventing encryption of the data.
- In addition, since there is an attack that encrypts not only the PC but also the entire data on a Linux or Unix service server at once, there is a situation in which a fundamental alternative is required. Therefore, in order to prevent the phishing, a new technique is required to block the resulting attack by the PC or service server even if the ransomware is run on the PC or service server while preventing the encrypted storage space created on the PC or service server from being stolen.
- The above information disclosed in this Background section is only for enhancement of understanding of the background of the invention and therefore it may contain information that does not form the prior art that is already known in this country to a person of ordinary skill in the art.
- The present invention has been made in an effort to solve the above-described problems associated with prior art and to provide a method and a system for blocking a ransomware attack for a server capable of safely managing data stored in the server and backup data from ransomware by a low-price and easy method without separate server manager.
- Another object of the present invention is to provide a method and a system blocking a phishing attack from the outside to lose data of a user terminal or a service server.
- According to an aspect of the present invention, there is provided a system for blocking a ransomware attack as a system for a server for blocking a ransomware attack comprising: a backup storage device which has a purpose for backing up the stored data in a server as a separate storage device which is physically independent from the server and includes a communication interface to enable a communication access to the server; and a service agent which is installed in the server to mediate the communication with the backup storage device, wherein while the backup storage device is storage-mounted on the server, after the data backup to the backup storage device for the storage data in the server is performed, when there is the lock command for the backup data backed up in the backup storage device, the backup storage device locks the corresponding backup data according to the lock command to process the locked backup data to be provided only in an uncorrectable read-only mode.
- In one embodiment, the data backup to the backup storage device may be processed only when the backup command for the storage data in the server is made, and when the service agent transmits the backup command received to the server to the backup storage device and the backup storage device may back up the corresponding storage data according to the received backup command.
- In one embodiment, when the data correction command received from the server is transmitted from the service agent, the backup storage device may confirm whether target data of the data correction command relates to the locked backup data, and when the target data is confirmed as the data correction command for the locked backup data, the backup storage device may reject the corresponding data correction command.
- In one embodiment, when the target data of the data correction command is the locked backup data, even in the case where the locked backup data is storage-mounted on a different storage device from the server, the backup storage device may reject the data correction command for the corresponding backup data received from the different storage device and process the corresponding backup data to be provided only in the read-only mode.
- In one embodiment, the backup storage device may include a hardware switch or a software switch for unlocking the locked state set in the backup data, and even in the case where the unlock command for the locked backup data is transmitted through the service agent, when switching to the unlocked state is not performed through an operating switching of the hardware switch or the software switch, the unlock command may be rejected.
- In one embodiment, when the switching to the unlocked state is performed by the hardware switch or the software switch, the backup storage device may release the read-only mode for the backup data according to the locked state to switch the corresponding backup data into a data correctable state.
- In one embodiment, the switching to the unlocked state may select any one of a batch unlock mode performed for the entire backup data in the backup storage device and a selective unlock mode performed only for the requested backup data.
- According to another aspect of the present invention, there is provided a system for blocking a phishing attack comprising: a phishing attack prevention storage device; and an agent program which is installed in a user terminal or a service server and performs an interworking operation with the phishing attack prevention storage device when the user terminal or the service server is connected with the phishing attack prevention storage device via a network and a storage area in the phishing attack prevention storage device is mounted in a network drive form.
- Here, when there is an open request for the file stored in the phishing attack prevention storage device from the user terminal or the service server, the phishing attack prevention storage device may check a storage operation mode and create a fake file other than the open-requested original file when the storage operation mode corresponds to a list-only mode to return the fake file to the user terminal or the service server.
- In one embodiment, the fake file may have the same file capacity as an original file to be open-requested, and a file text may be filled with a null value or an unknown value.
- In one embodiment, the agent program may provide selection information to enable a user to select switching to an edit mode or termination of the edit mode with respect to a folder or file stored in the phishing attack prevention storage device mounted on the user terminal or the service server in a network drive format, and request a release of the list-only mode to the phishing attack prevention storage device when the file open request corresponds to an edit mode open request according to the switching to the edit mode.
- At this time, the phishing attack prevention storage device may release the list-only mode according to the edit mode open request and allow the open-requested original file to be provided to the user terminal or the service server.
- In one embodiment, the agent program may request a release of the list-only mode to the phishing attack prevention storage device when there is a release request of the list-only mode according to a pre-registered mode from the user terminal or the service server.
- At this time, the phishing attack prevention storage device may allow the open-requested original file to be provided to the user terminal or the service server according to the release request of the list-only mode.
- Here, the release of the list-only mode may be executed through an authority's authentication by an authentication device pre-registered from the user.
- According to the method and the system blocking the ransomware attack according to the embodiment of the present invention, it is possible to safe manage data stored in the server and backup data from ransomware by a low-price and easy method without separate server manager.
- According to the method and the system blocking the phishing attack according to the embodiment of the present invention, it is possible to prevent and block a phishing from the outside by using a storage device for phishing prevention which is operable in a list-only mode according to a security policy as a separate storage device which is connected with the user terminal or the service server via a network, but is physically independent.
- The above and other features of the present invention will now be described in detail with reference to certain exemplary embodiments thereof illustrated the accompanying drawings which are given hereinbelow by way of illustration only, and thus are not limitative of the present invention, and wherein:
-
FIG. 1 is a diagram showing a process of storage-mounting a backup storage device on a server in a system for a server for blocking a ransomware attack according to an embodiment of the present invention; -
FIG. 2 is a diagram showing a process of backing-up and locking the data by the backup storage device in the system for the server for blocking the ransomware attack according to the embodiment of the present invention; -
FIG. 3 is a diagram showing a process of releasing the lock by the backup storage device in the system for the server for blocking the ransomware attack according to the embodiment of the present invention; -
FIG. 4 is a diagram for describing a list-only mode as a basic process according to a method and a system for preventing a phishing attack according to an embodiment of the present invention; -
FIG. 5 is a diagram for describing a method for opening a file in an editable state by releasing the list-only mode according to an embodiment of the present invention; -
FIG. 6 is a diagram for describing a method for performing additional authentication in the process of releasing the list-only mode according to an embodiment of the present invention; -
FIG. 7 is a screen example for a case where a user switches a specific file to ‘edit mode open’ or ‘edit mode switching’ after mounting a storage space of a storage device for preventing a phishing attack in a window explorer in a network drive; and -
FIG. 8 is an execution screen example capable of transmitting an edit mode termination command when the edit mode ofFIG. 7 is released. - It should be understood that the appended drawings are not necessarily to scale, presenting a somewhat simplified representation of various preferred features illustrative of the basic principles of the invention. The specific design features of the present invention as disclosed herein, including, for example, specific dimensions, orientations, locations, and shapes will be determined in part by the particular intended application and use environment.
- In the figures, reference numbers refer to the same or equivalent parts of the present invention throughout the several figures of the drawing.
- Hereinafter reference will now be made in detail to various embodiments of the present invention, examples of which are illustrated in the accompanying drawings and described below. While the invention will be described in conjunction with exemplary embodiments, it will be understood that present description is not intended to limit the invention to those exemplary embodiments. On the contrary, the invention is intended to cover not only the exemplary embodiments, but also various alternatives, modifications, equivalents and other embodiments, which may be included within the spirit and scope of the invention as defined by the appended claims.
- Hereinafter, reference will now be made in detail to various embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings and described below.
- As a technical object of the present invention, a system for a server for blocking a ransomware attack will be described (see
FIGS. 1 to 3 ). - Hereinafter, before describing a system for a server for blocking a ransomware attack according to an embodiment of the present invention with reference to
FIGS. 1 to 3 , to help in the understanding of the present invention, differences between the method of the present invention and other methods will be described as follows. - In conventional prior arts, there is a ‘program-based read-only storage” implementation method, which is a technology in which when whether the program is a program authorized on a file protection policy is determined, if there is the authorized program, the correction of the file is enabled, and if not, the program operates only in a read-only mode. In such a program-based read-only storage implementation method, since commands and responses are basically performed by a file unit, a read-only file is provided by a file unit. However, such a program-based read-only storage implementation method has the following weak points.
- For example, in the case of Linux operating systems, when an admin account is extorted, since all commands or traffics transmitted to a backup server may be read from a hacker side, the hacker watches the commands transmitted to the backup server and then extorts a fingerprint and the like of the authorized program to perform a replay attack (that is, an attack in which a hacking program is the same name as the authorized program and disguised like a normal program by transmitting the extorted fingerprint value to the backup server), and thus a security method of the technology is neutralized.
- On the other hand, according to the present invention, as described above, even though the admin account is extorted, the ransomware attack and the like by the hacker may be blocked. This may be apparently understood from the descriptions for the present invention to be described below.
- In another method, there is a “file creation time-based read-only storage” implementation method. This is a method disclosed in Korean Patent Application No. 10-2018-0029490 filled by its company, which is a technology of basically providing a file only in a read-only mode, but admitting the creation of the corresponding file within a predetermined time (that is, a file creation effective time range) based on a creation request time of the corresponding file only in the case where the creation of a new file is required, and further operating a file unit as a basic unit.
- However, even in the file creation time-based read-only storage implementation method, in some cases, the following security vulnerability is shown. That is, although a file having a small size (capacity) of the file uploaded in the file creation process is not a problem, in the case of a backup of a file having a large size, the file creation effective time range needs to be increased, but if the time is opened too long, a possibility to be exposed to an external attack may be increased for the time. For example, in the case of the backup, in order to enhance the storage efficiency, the large-sized file is not backed up by one file unit, but is bound and backed up into one file with a Tar or ZIP format, and if the file size is too large, a correctable time of the file needs to be sufficiently much given.
- In order to improve the aforementioned problems, in the embodiment of the present invention, a “command-based read-only storage” implementation method is provided. Such a command-based read-only storage implementation method is executed by a backup command, a lock command, and an unlock command, and at this time, the backup/lock/unlock may be operated by a file unit and may be operated by a folder unit. Accordingly, even in the case where there is a correction request for a specific file, when a folder (extended to a higher folder of the corresponding folder) storing the corresponding file is in a locked state according to a path of the corresponding file, the correction request for the corresponding file is rejected.
- These backup/lock/unlock commands may use a command structure in accordance with the following commands by the Linux operating system.
- Examples of Backup Command
- User>mount 192.10.1.1 localhost\backup
-
- (Mkdir \backup\websource_backup_20190805)
- Copy/Backup ‘\websource’‘\backup\websource_backup_20190805’
- Examples of Lock Command
- freeze \backup\websource_backup_20190805
- Examples of Unlock Command
- Melt \backup\websource_backup_20190805 (OTP 201023)
- As described above, in the case of the unlock command, authentication by a one-time password (OTP) may be additionally requested.
- As described above, according to the method of the present invention, the backup data may be changed into a read-only mode by locking all files and folders below a specific folder by a very simple console command.
- According to the command-based read-only storage implementation method according to the embodiment of the present invention, generally, when the file is required to a mounted drive, a folder path storing the file is included in the corresponding request. As such, when a correction request is limited based on the file and the folder path, there is an advantage of omitting management for unnecessary metadata for each file (a difference between the creation time and a current request time in the case of the creation time-based read-only storage implementation method described above, and attribution information, a fingerprint value, etc. of the corresponding program in the case of the program-based read-only storage implementation method described above).
- Hereinafter, embodiments of the present invention will be sequentially described with reference to
FIGS. 1 to 3 . - A system for blocking a ransomware attack according to the embodiment of the present invention includes a backup storage device (see “mega storage” of
FIGS. 1 to 3 , same as below) which has a purpose for backing up the stored data in a server as a separate storage device which is physically independent from the server and includes a communication interface to enable a communication access to the server; and a service agent (see “mega connector” ofFIGS. 1 to 3 , same as below) which is installed in the server to mediate the communication with the backup storage device. - In a system for the server for blocking the ransomware attack of the present invention, the backup storage device provides the same environment as a general storage which is connectable via a network or directly. That is, like a general storage connected by NAS, DAS, SAN, etc., the backup storage device provides mount/unmount and provides an I/O of an operating system as it is so that there is no problem when various backup utilities and tools such as rsync are operated.
- Further, a service agent may be installed to be driven in a service level of the operating system in the installation step or driven at any location by registering a program execution environment pass of the operating system.
- According to the embodiment of the present invention, while the backup storage device is storage-mounted on the server, after the data backup to the backup storage device for the storage data in the server is performed, when there is the lock command for the backup data backed up in the backup storage device, the backup storage device locks the corresponding backup data according to the lock command to process the locked backup data to be provided only in an uncorrectable read-only mode.
- According to the embodiment of the present invention, the data backup to the backup storage device may be processed only when the backup command for the storage data in the server is made, and when the service agent transmits the backup command received to the server to the backup storage device and the backup storage device may back up the corresponding storage data according to the received backup command. This will be described below with reference to
FIG. 1 . Here,FIG. 1 is a diagram showing a process of storage-mounting a backup storage device on a server in a system for a server for blocking a ransomware attack according to an embodiment of the present invention. - Referring to
FIG. 1 , the backup storage device (mega storage) refers to a device or server device in which an actual storage device is built-in and a hybrid WORM program is mounted, and the service agent (mega connector) is a module installed in a customer service server to communicate with the backup storage device (mega storage). - A user needs to mount the backup storage device (mega storage) to back up the data of its own service server. A mount request of the user is received and processed by the service agent (mega connector), and various I/Os of the operating system related to a storage mount are processed through the backup storage device (mega storage) and then the service agent (mega connector) returns the result to the operating system.
- In an example of
FIG. 1 , an example in which the backup storage device (mega storage) is mounted on a new folder called backup below a folder called /media. -
FIG. 2 is a diagram showing a process of backing up and locking data by the backup storage device. - In the embodiment of the present invention, when the data correction command received from the server is transmitted from the service agent, the backup storage device confirms whether target data of the data correction command relates to the locked backup data, and when the target data is confirmed as the data correction command for the locked backup data, the backup storage device rejects the corresponding data correction command.
- Referring to
FIG. 2 , when the user requests a lock (provided by the service agent (mega connector) after backing up data of /websource to /media/backup/websource/20180101 (seeFIG. 2A ), the backup storage device (mega storage) locks the corresponding folder and thereafter, operates only in a read-only mode (seeFIGS. 2B and 2C ). - At this time, the folder of /media/backup/websource/20180101 may be created with a command such as mkdir in the case of the Linux operating system.
- Further, information on the locked folders may be stored in a non-volatile memory (such as a database, etc.) of the backup storage device (mega storage), and thus the data may be maintained even if the power supply to the backup storage device is interrupted.
- Thereafter, the data correction requests (e.g., a write file, a modify file, a move file, a delete file, etc.) for /media/backup/websource/20180101 all are rejected by the user or any processor including ransomware.
- Further, according to another embodiment, when the target data of the data correction command is the locked backup data, even in the case where the locked backup data is storage-mounted on a different storage device from the server, the backup storage device rejects the data correction command for the corresponding backup data received from the different storage device and may process the corresponding backup data to be provided only in the read-only mode.
- That is, information on the locked folders is set to a storage reference path (/websource/20180101 in an example of
FIG. 1 ) of the backup storage device (mega storage), and even though the backup storage device is mounted on another path (e.g., /media/data) of another device, /media/data/websource/20180101 may still be implemented accessibly only in the read-only mode. -
FIG. 3 is a diagram showing a process of performing the unlocking by the backup storage device. - In the embodiment of the present invention, the backup storage device may include a hardware switch (e.g., a hardware button for locking and unlocking provided in the backup storage device) or a software switch for unlocking the locked state set in the backup data. Accordingly, even in the case where the unlock command for the locked backup data is transmitted through the service agent, when switching to the unlocked state is not performed through an operating switching of the hardware switch or the software switch, the unlock command may be rejected (see
FIG. 3D ). - Accordingly, when the switching to the unlocked state is performed by the hardware switch or the software switch, the backup storage device releases the read-only mode for the backup data according to the locked state to switch the backup data into a data correctable state (see
FIGS. 3E and 3F ). - At this time, the switching to the unlocked state is able to select any one of a batch unlock mode performed for the entire backup data in the backup storage device and a selective unlock mode performed only for the requested backup data.
- As described above, in the present invention, basically, once-locked folders and files and folders therebelow are accessible only in the read-only mode and may be implemented so that any unlocking is impossible by the user. However, when the locked folders are increased, a writable area of the backup storage device (mega storage) is continuously decreased. Accordingly, an unlocking function is given to reuse the storage, and in the backup storage device (mega storage) of the present invention, the unlocking is performed by an operation of turning off the hardware switch (physical switch (protect switch)) or the software switch. As such, while the corresponding switch (the protect switch) is turned off, a specific folder is able to be unlocked or the entire backup storage device (mega storage) is able to be unlocked. Of course, in addition to an on/off mode of the hardware switch and the software switch, an on/off mode (that is, lock and unlock) using a one time password (OTP) is applicable.
- With respect to the locking and unlocking mode described above, various modes may be further present as follows. Hereinafter, various embodiments thereof will be described.
- According to an embodiment of the present invention, the locking of the backup storage device may be performed by a mode executed (that is, changed to a read-only mode) only when a pre-specified lock command (ex. a lock command using a freeze command) needs to be input manually , but may be automatically executed according to a predetermined condition. As an example, when a file event coming into the corresponding network drive from a client program installed in the user terminal is a file/folder creation event (ex. create event), the creation of the corresponding file is allowed, or when a termination event (ex. close event) of the corresponding file/folder comes into the network driver, a method of automatically executing locking for the corresponding file/folder may also be applied.
- Here, as a C function creating an I/O event closing a file handle, according to the windows OS, two C functions below may be representatively used.
- int fclose(FILE *stream)
- BOOL CloseHandle(HANDLE hObject)
- Here, as a C function creating an I/O event closing a file handle, according to the Linux/Unix OS, a C function below may be representatively used.
- int close(int fd)
- As described above, when a program calls API closing the file handle, the I/O event closing the file handle occurs, and the event is transmitted to a file system. In this case, in the Windows, the I/O may be detected by a callback file system (file system driver), and in the Linux, the I/O may be detected by FUSE.
- Also, if a specific application is terminated while the file handle is opened, generally, file handles forcibly opened by the OS are closed, and at this time, the same event I/O occurs.
- The functions described above are functions used in the C language, and functions closing the file handle are present separately for each language. The corresponding functions generate events to close the file handle to all file systems.
- Further, hereinabove, the method for only reading or not the data stored in the backup storage device by a folder unit by the on/off selection using the hardware switch and the like is mainly described. However, as described above, according to a system design method, a method of automatically changing the data to the read-only mode by detecting the termination event of the file is adopted, and while the hardware switch or the like is turned on, even in the case where there is an initialization command of the corresponding disk, a method in which the initialization of the disk is not operated may also be applied.
- As a second technical object of the present invention, a system for blocking a phishing attack will be described (see
FIGS. 4 to 8 ). - Hereinafter, before describing a system for a server for blocking a phishing attack according to another embodiment of the present invention with reference to
FIGS. 4 to 8 , to help in the understanding of the present invention, differences between the method of the present invention and other methods will be described as follows. - According to conventional prior arts, in order to prevent leakage and modification of data stored in user terminals such as a PC and a service server by unknown installation of a malicious program by hackers, a method of storing files required for security due to a file security policy separately in a security storage area, a method of allowing the file to be edited only by an authorized program, or a method of configuring a file in a read-only storage to open the file only in a read-only mode has been used.
- However, the method for storing the files separately in the security storage area and the method of allowing the file edition only by the authorized program have a weak point of extorting and simultaneously neutralizing an admin account of the operating system. As such, when the admin account is extorted, since all commands or traffics to be input/output may be read from the hacker side, the hacker watches the corresponding input/output commands and then extorts a fingerprint value and the like of the authorized program and performs a replay attack (that is, an attack in which a hacking program is the same name as the authorized program and disguised like a normal program by transmitting the extorted fingerprint value to the backup server) to neutralize a security mode of the above technology.
- Further, even in the case of the method of allowing the file to be configured as a read-only storage and opened only in the read-only mode, the method is strong to the ransomware attack, but the data is able to be leaked by a method of capturing contents of the files opened in the read-only mode, and thus there is a possibility to be neutralized to the phishing attack.
- In order to improve the aforementioned problems, in the embodiment of the present invention, provided is a method capable of improving the weak points described above and preventing the data leakage by the phishing attack by using a separate storage device (hereinafter, referred to as a phishing attack prevention storage device) basically operating as a “list-only mode” and physically independent.
- Hereinafter, embodiments of the present invention will be sequentially described in detail with reference to the accompanying drawings.
-
FIG. 4 is a diagram for describing a list-only mode as a basic process according to a method and a system for preventing a phishing attack according to an embodiment of the present invention. - In this specification, for convenience and concentration of description, it will be described based on a case where a user terminal such as a PC is connected with a phishing attack prevention storage device via a network and the entire storage area or a specific storage area of the phishing attack prevention storage device is mounted on the user terminal in a network drive form. However, it will be apparent that the present invention may be equally applied even to a service server based on the Linux or UNIX mounts and uses the storage area of the phishing attack prevention storage device.
- Referring to
FIG. 4 , when the user attempts to open the file in a list-only state by a file explorer, the file explorer executes a basic program (e.g., a basic program WINWORD.EXE to process an extension docx) to process the corresponding file extension and then transmits file information. The basic program is transmitted to the phishing attack prevention storage device (hereinafter, referred to as a filing box mini device) through an agent program (hereinafter, referred to as a filing box mini application or requesting a file read by the operating system and operating as a file system driver. - The filing box mini device checks a list-only mode of the requested file to return fake data (in the case of the list-only mode) and provide the fake data to the basic program. Accordingly, the user finally watches document having the fake data or confirms errors generated by the basic program due to the fake data.
- The fake file has the same file capacity as an original file to be open-requested, and a file text may be filled with a null value or an unknown value which cannot determine any meanings.
-
FIG. 5 is a diagram for describing a method for opening a file in an editable state by releasing the list-only mode according to an embodiment of the present invention. - Referring to
FIG. 5 , after the user selects a specific file in the file explorer, the user clicks a right-side mouse button to pop-up a context menu of a shell extension of the file explorer. Thereafter, when the user selects a menu of ‘open to edit mode’, the file explorer requests a list-only mode release of the corresponding file to the filing box mini application and the filing box mini application allows the request to be performed to the filing box mini device. When the list-only mode of the corresponding file is normally released, the file explorer executes the basic program to process the extension of the corresponding file and then transmits the file information, and the basic program reads and processes the original data from the filing box mini device through the operating system and the filing box mini application. -
FIG. 6 is a diagram for describing a method for performing additional authentication in the process of releasing the list-only mode according to an embodiment of the present invention. - Referring to
FIG. 6 , when the user intends to open the specific file in a usable form, a list-only mode of the corresponding file is released through additional OTP authentication. - The user needs to first register a user's own OTP device (a mobile, etc.) to the filing box mini device once.
- The user requests a device registration together with user's own ID through the filing box mini application and the filing box mini device receiving the request requests creation and registration of a new TOTP parameter to be used in the corresponding user's ID to an internal device authentication unit. Normally, the TOTP parameter registered in the device authentication unit is transmitted to the filing box mini application to be exposed to the user. When the user registers the corresponding TOTP parameter to user's own OTP device, the initial OTP device registration process is completed.
- Thereafter, the user selects the specific file in the file explorer and then clicks the right-side mouse button to pop-up a context menu of the file explorer (shell extension), and thereafter, when the user selects the menu of ‘open to edit mode’, the filing box mini application inquires an authentication policy from the filing box mini device to recognize that the OTP authentication is required and requests a TOTP value to the user. The user obtains the TOTP value from the user's own OTP device to provide the obtained TOTP value to the filing box mini device and the filing box mini device receiving the value requests the authentication to the internal device authentication unit. When the authentication is successful, the filing box mini device releases the list-only mode of the corresponding file to change the file to a usable state.
- Here,
FIG. 7 is a screen example for a case where a user switches a specific file to ‘edit mode open’ or ‘edit mode switching’ after mounting a storage space of a storage device for preventing a phishing attack in a window explorer in a network drive andFIG. 8 is an execution screen example capable of transmitting an edit mode termination command when the edit mode ofFIG. 7 is released. - Further, the processing such as the switching to the edit mode or/and the termination of the edit mode may also be performed per unit file, but in some cases, the processing such as the switching to the edit mode or/and the termination of the edit mode may be simultaneously performed in a plurality of files within a required range or a set range in driving the file. As one example, when reference files having sub folders need to be simultaneously accessed and used as in the case of CAD or a software development tool, even by switching to the edit mode/termination manipulation of the edit mode for any one file, all corresponding sub folders or reference files in the sub folder associated therewith will be enabled to be switched to the edit mode/ended.
- The invention has been described in detail with reference to preferred embodiments thereof. However, it will be appreciated by those skilled in the art that changes may be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (7)
1. A system for blocking a ransomware attack as a system for a server for blocking a ransomware attack comprising:
a backup storage device which has a purpose for backing up the stored data in a server as a separate storage device which is physically independent from the server and includes a communication interface to enable a communication access to the server; and a service agent which is installed in the server to mediate the communication with the backup storage device,
wherein while the backup storage device is storage-mounted on the server, after the data backup to the backup storage device for the storage data in the server is performed, when there is the lock command for the backup data backed up in the backup storage device,
the backup storage device locks the corresponding backup data according to the lock command to process the locked backup data to be provided only in an uncorrectable read-only mode.
2. The system for blocking the ransomware attack of claim 1 , wherein the data backup to the backup storage device is processed only when the backup command for the storage data in the server is made, and when the service agent transmits the backup command received to the server to the backup storage device and the backup storage device backs up the corresponding storage data according to the received backup command.
3. The system for blocking the ransomware attack of claim 1 , wherein when the data correction command received from the server is transmitted from the service agent, the backup storage device confirms whether target data of the data correction command relates to the locked backup data, and when the target data is confirmed as the data correction command for the locked backup data, the backup storage device rejects the corresponding data correction command.
4. The system for blocking the ransomware attack of claim 3 , wherein when the target data of the data correction command is the locked backup data, even in the case where the locked backup data is storage-mounted on a different storage device from the server, the backup storage device rejects the data correction command for the corresponding backup data received from the different storage device and processes the corresponding backup data to be provided only in the read-only mode.
5. The system for blocking the ransomware attack of claim 1 , wherein the backup storage device includes a hardware switch or a software switch for unlocking the locked state set in the backup data, and
even in the case where the unlock command for the locked backup data is transmitted through the service agent, when switching to the unlocked state is not performed through an operating switching of the hardware switch or the software switch, the unlock command is rejected.
6. The system for blocking the ransomware attack of claim 5 , wherein when the switching to the unlocked state is performed by the hardware switch or the software switch, the backup storage device releases the read-only mode for the backup data according to the locked state to switch the corresponding backup data into a data correctable state.
7. The system for blocking the ransomware attack of claim 6 , wherein the switching to the unlocked state is able to select any one of a batch unlock mode performed for the entire backup data in the backup storage device and a selective unlock mode performed only for the requested backup data.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US18/086,716 US20230132303A1 (en) | 2019-11-27 | 2022-12-22 | System for blocking a ransomware attack |
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/618,115 US11811790B2 (en) | 2019-11-27 | 2019-11-27 | Anti-phishing system |
| PCT/KR2019/016426 WO2021107177A1 (en) | 2019-11-27 | 2019-11-27 | Method and system for blocking ransomware or phishing attacks |
| US18/086,716 US20230132303A1 (en) | 2019-11-27 | 2022-12-22 | System for blocking a ransomware attack |
Related Parent Applications (2)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/618,115 Division US11811790B2 (en) | 2019-11-27 | 2019-11-27 | Anti-phishing system |
| PCT/KR2019/016426 Division WO2021107177A1 (en) | 2019-11-27 | 2019-11-27 | Method and system for blocking ransomware or phishing attacks |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| US20230132303A1 true US20230132303A1 (en) | 2023-04-27 |
Family
ID=76130612
Family Applications (3)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/618,115 Active 2041-05-26 US11811790B2 (en) | 2019-11-27 | 2019-11-27 | Anti-phishing system |
| US18/086,716 Abandoned US20230132303A1 (en) | 2019-11-27 | 2022-12-22 | System for blocking a ransomware attack |
| US18/376,442 Active US12113813B2 (en) | 2019-11-27 | 2023-10-04 | Anti-phishing system |
Family Applications Before (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/618,115 Active 2041-05-26 US11811790B2 (en) | 2019-11-27 | 2019-11-27 | Anti-phishing system |
Family Applications After (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US18/376,442 Active US12113813B2 (en) | 2019-11-27 | 2023-10-04 | Anti-phishing system |
Country Status (5)
| Country | Link |
|---|---|
| US (3) | US11811790B2 (en) |
| JP (2) | JP7489672B2 (en) |
| KR (4) | KR20250060949A (en) |
| CN (2) | CN114080782B (en) |
| WO (1) | WO2021107177A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20250173423A1 (en) * | 2023-11-27 | 2025-05-29 | Acronis International Gmbh | Virtual file honey pots for computing systems behavior-based protection against ransomware attacks |
| US20250307216A1 (en) * | 2024-03-26 | 2025-10-02 | Hitachi, Ltd. | Cloud data base system and data management method |
Families Citing this family (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102764007B1 (en) | 2017-01-26 | 2025-02-06 | 삼성디스플레이 주식회사 | Display device |
| US11509691B2 (en) * | 2020-05-15 | 2022-11-22 | Paypal, Inc. | Protecting from directory enumeration using honeypot pages within a network directory |
| US12105596B2 (en) * | 2021-07-06 | 2024-10-01 | Cyntegra Ltd | Securely backing up and restoring a computer system using a trusted OS |
| KR102623168B1 (en) * | 2022-06-17 | 2024-01-10 | (주)나무소프트 | Data protection system |
| US12505213B2 (en) | 2022-10-04 | 2025-12-23 | Dell Products L.P. | Cyber recovery forensics kit configured to maintain communication and send return malware |
| US12505214B2 (en) | 2022-10-14 | 2025-12-23 | Dell Products L.P. | Cyber recovery forensic kit—application-based granularity |
| CN116318918A (en) * | 2023-02-27 | 2023-06-23 | 中国建设银行股份有限公司 | Trojan detection method, device and equipment |
| JP2025031052A (en) * | 2023-08-25 | 2025-03-07 | 日立ヴァンタラ株式会社 | Storage and storage data protection method |
| WO2025116601A1 (en) * | 2023-11-30 | 2025-06-05 | 주식회사 유에이치엠소프트 | Smart phone protection system and method using mdm when detecting ransomware |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100169594A1 (en) * | 2008-12-31 | 2010-07-01 | Tsaur Ynn-Pyng A | Granular application data lifecycle sourcing from a single backup |
| US20120210398A1 (en) * | 2011-02-14 | 2012-08-16 | Bank Of America Corporation | Enhanced Backup and Retention Management |
| US9678965B1 (en) * | 2009-06-29 | 2017-06-13 | Veritas Technologies Llc | System and method for enforcing data lifecycle policy across multiple domains |
| US10409629B1 (en) * | 2016-09-26 | 2019-09-10 | EMC IP Holding Company LLC | Automated host data protection configuration |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7536598B2 (en) * | 2001-11-19 | 2009-05-19 | Vir2Us, Inc. | Computer system capable of supporting a plurality of independent computing environments |
| US7953913B2 (en) * | 2008-04-10 | 2011-05-31 | Sandisk Il Ltd. | Peripheral device locking mechanism |
| US20140068270A1 (en) * | 2011-05-20 | 2014-03-06 | Gurudatt Shenoy | Systems And Methods For Device Based Secure Access Control Using Encryption |
| US20130263226A1 (en) * | 2012-01-22 | 2013-10-03 | Frank W. Sudia | False Banking, Credit Card, and Ecommerce System |
| KR101385688B1 (en) * | 2012-09-12 | 2014-04-15 | (주)나무소프트 | Apparatus and Method for managing files |
| RU2017141988A (en) * | 2015-05-04 | 2019-06-04 | Сайед Камран ХАСАН | METHOD AND DEVICE FOR MANAGING SECURITY IN A COMPUTER NETWORK |
| WO2016189843A1 (en) * | 2015-05-27 | 2016-12-01 | 日本電気株式会社 | Security system, security method, and recording medium for storing program |
| US10049215B2 (en) * | 2015-09-15 | 2018-08-14 | The Johns Hopkins University | Apparatus and method for preventing access by malware to locally backed up data |
| KR102107277B1 (en) * | 2016-08-08 | 2020-05-06 | (주)나무소프트 | System and method for anti-fishing or anti-ransomware application |
| US10289844B2 (en) * | 2017-01-19 | 2019-05-14 | International Business Machines Corporation | Protecting backup files from malware |
| US10708308B2 (en) * | 2017-10-02 | 2020-07-07 | Servicenow, Inc. | Automated mitigation of electronic message based security threats |
| KR102034678B1 (en) * | 2018-02-09 | 2019-10-21 | 주식회사 안랩 | Malware preventing system anf method based on access controlling for data file |
| US11645943B2 (en) * | 2018-04-11 | 2023-05-09 | Barracuda Networks, Inc. | Method and apparatus for training email recipients against phishing attacks using real threats in realtime |
| CN110472443A (en) * | 2018-05-11 | 2019-11-19 | 威尔奇·伊沃 | A kind of local device of data security methods and belt switch |
-
2019
- 2019-11-27 KR KR1020257013842A patent/KR20250060949A/en active Pending
- 2019-11-27 CN CN201980097990.6A patent/CN114080782B/en active Active
- 2019-11-27 JP JP2021577491A patent/JP7489672B2/en active Active
- 2019-11-27 KR KR1020247015779A patent/KR20240104106A/en not_active Ceased
- 2019-11-27 KR KR1020217001669A patent/KR20210068388A/en not_active Ceased
- 2019-11-27 KR KR1020217041054A patent/KR20210156309A/en not_active Ceased
- 2019-11-27 US US16/618,115 patent/US11811790B2/en active Active
- 2019-11-27 CN CN202410412383.7A patent/CN118300848A/en active Pending
- 2019-11-27 WO PCT/KR2019/016426 patent/WO2021107177A1/en not_active Ceased
-
2022
- 2022-12-22 US US18/086,716 patent/US20230132303A1/en not_active Abandoned
-
2023
- 2023-10-04 US US18/376,442 patent/US12113813B2/en active Active
-
2024
- 2024-01-10 JP JP2024001772A patent/JP7574995B2/en active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100169594A1 (en) * | 2008-12-31 | 2010-07-01 | Tsaur Ynn-Pyng A | Granular application data lifecycle sourcing from a single backup |
| US9678965B1 (en) * | 2009-06-29 | 2017-06-13 | Veritas Technologies Llc | System and method for enforcing data lifecycle policy across multiple domains |
| US20120210398A1 (en) * | 2011-02-14 | 2012-08-16 | Bank Of America Corporation | Enhanced Backup and Retention Management |
| US10409629B1 (en) * | 2016-09-26 | 2019-09-10 | EMC IP Holding Company LLC | Automated host data protection configuration |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20250173423A1 (en) * | 2023-11-27 | 2025-05-29 | Acronis International Gmbh | Virtual file honey pots for computing systems behavior-based protection against ransomware attacks |
| US12423411B2 (en) * | 2023-11-27 | 2025-09-23 | Acronis International Gmbh | Virtual file honey pots for computing systems behavior-based protection against ransomware attacks |
| US20250307216A1 (en) * | 2024-03-26 | 2025-10-02 | Hitachi, Ltd. | Cloud data base system and data management method |
| US12461897B2 (en) * | 2024-03-26 | 2025-11-04 | Hitachi, Ltd. | Cloud data base system and data management method |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20240104106A (en) | 2024-07-04 |
| US20210336970A1 (en) | 2021-10-28 |
| CN114080782B (en) | 2024-04-26 |
| US11811790B2 (en) | 2023-11-07 |
| KR20210156309A (en) | 2021-12-24 |
| JP2024038306A (en) | 2024-03-19 |
| KR20210068388A (en) | 2021-06-09 |
| WO2021107177A1 (en) | 2021-06-03 |
| CN114080782A (en) | 2022-02-22 |
| JP2023503760A (en) | 2023-02-01 |
| US12113813B2 (en) | 2024-10-08 |
| US20240031384A1 (en) | 2024-01-25 |
| JP7489672B2 (en) | 2024-05-24 |
| JP7574995B2 (en) | 2024-10-29 |
| CN118300848A (en) | 2024-07-05 |
| KR20250060949A (en) | 2025-05-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12113813B2 (en) | Anti-phishing system | |
| EP3525127B1 (en) | System for blocking phishing or ransomware attack | |
| US8281135B2 (en) | Enforcing use of chipset key management services for encrypted storage devices | |
| US10268827B2 (en) | Method and system for securing data | |
| CN101079882B (en) | Posture-based data protection | |
| CN112513857A (en) | Personalized cryptographic security access control in a trusted execution environment | |
| US20080114990A1 (en) | Usable and secure portable storage | |
| KR20120037406A (en) | Remote access control of storage devices | |
| EP3438864B1 (en) | Method and system for protecting a computer file against possible malware encryption | |
| CA2963190A1 (en) | Controlling access to application data | |
| US8713640B2 (en) | System and method for logical separation of a server by using client virtualization | |
| US20090158026A1 (en) | Method and device for securely configuring a terminal by means of a startup data storage device | |
| KR20200013013A (en) | System and method for anti-fishing or anti-ransomware application | |
| KR102340604B1 (en) | System and method for anti-ransomware application for server | |
| CN121188756A (en) | Access control system and methods for electronic devices | |
| CN115952543A (en) | PCIE encryption card, management application system, hard disk read-write method, device and medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: NAMUSOFT CO., LTD, KOREA, REPUBLIC OF Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WOO, JONG HYUN;REEL/FRAME:062179/0137 Effective date: 20211126 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |