Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Hello, can you explain the detailed procedure on how it creates a back up when it encounters an open syscall? #4

Open
kailashg26 opened this issue Jul 13, 2021 · 3 comments

Comments

@kailashg26
Copy link

No description provided.

@kailashg26 kailashg26 changed the title Hello, can you the detailed procedure on how it creates a back up when it encounters an opensyscall? Hello, can you explain the detailed procedure on how it creates a back up when it encounters an opensyscall? Jul 13, 2021
@kailashg26 kailashg26 changed the title Hello, can you explain the detailed procedure on how it creates a back up when it encounters an opensyscall? Hello, can you explain the detailed procedure on how it creates a back up when it encounters an open syscall? Jul 13, 2021
@kailashg26
Copy link
Author

No description provided.

Just for the information, I'm using this ransomware candidate: https://github.com/DaniAffCH/Ransomware to experiment and basically trying to use the mechanism provided by you to protect the file (have a backup)

@gunh0
Copy link
Owner

gunh0 commented Jul 15, 2021

Thank you for your interest in my work.

First of all, the Backup Linux kernel module I created must be aware of the file extensions targeted by ransomware.

If the ransomware does not attack specific file extensions and encrypts randomly binary files, even files backed up by this module will be infected.

As you can see here, when the user opens the target file,
(https://github.com/devgunho/Automatic_Recovery_In_Linux/blob/master/auto_recovery_lkm/filename_extension_check.c)

It is a hooking flow at main.c.
(https://github.com/devgunho/Automatic_Recovery_In_Linux/blob/master/auto_recovery_lkm/main.c)

@gunh0
Copy link
Owner

gunh0 commented Jul 15, 2021

Oh, and An essential hypothesis of this recovery module is that 'OPEN' behavior should occur in the Linux kernel.
If this ransomware (https://github.com/DaniAffCH/Ransomware) attack does not 'OPEN' target files, this solution will fail.

Thank you for introducing me to interesting ransomware.

I will experiment with this ransomware as soon as I have time later.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants