CN110874474A - Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium - Google Patents

Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium Download PDF

Info

Publication number
CN110874474A
CN110874474A CN201811579545.7A CN201811579545A CN110874474A CN 110874474 A CN110874474 A CN 110874474A CN 201811579545 A CN201811579545 A CN 201811579545A CN 110874474 A CN110874474 A CN 110874474A
Authority
CN
China
Prior art keywords
currently created
file handle
virus
file
created file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811579545.7A
Other languages
Chinese (zh)
Inventor
张婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ahtech Network Safe Technology Ltd
Original Assignee
Beijing Ahtech Network Safe Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ahtech Network Safe Technology Ltd filed Critical Beijing Ahtech Network Safe Technology Ltd
Priority to CN201811579545.7A priority Critical patent/CN110874474A/en
Publication of CN110874474A publication Critical patent/CN110874474A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/565Static detection by checking file integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a method and a device for defending a Lessomer virus, electronic equipment and a storage medium, relates to the technical field of network security, and aims to effectively identify the Lessomer virus in time. The Lessocian virus defense method comprises the following steps: monitoring the creation of file handles; if the file handle is created currently, inquiring the attribute of the currently created file handle, and judging whether the attribute of the currently created file handle has write permission; if the attribute of the currently created file handle has the write permission, inquiring the process to which the currently created file handle belongs; judging whether the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics or not; and if the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics, determining that the process to which the currently created file handle belongs is the process of the Lexoplasma virus. The invention is suitable for identifying the Lexomer virus and recovering the file.

Description

Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium
Technical Field
The present invention relates to the field of network security technologies, and in particular, to a method and an apparatus for defending a lemonade virus, an electronic device, and a storage medium.
Background
Currently, Lessocian viruses are becoming increasingly favored by various lawbreakers because of their beneficial properties. Various lemonade virus versions are outbreaking without exception. Infected users are no longer only directed at individual users, and all enterprises and public institutions are affected to different degrees, so that crisis caused by the infected users is increased.
How to effectively identify the Lexomer virus in time becomes a hot point of concern for each antivirus vendor.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for defending against a lemonade virus, an electronic device, and a storage medium, which can effectively identify a lemonade virus in time.
In a first aspect, an embodiment of the present invention provides a method for defending against a lemonade virus, including: monitoring the creation of file handles; if the file handle is created currently, inquiring the attribute of the currently created file handle, and judging whether the attribute of the currently created file handle has write permission; if the attribute of the currently created file handle has the write permission, inquiring the process to which the currently created file handle belongs; judging whether the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics or not; and if the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics, determining that the process to which the currently created file handle belongs is the process of the Lexoplasma virus.
According to a specific implementation manner of the embodiment of the present invention, the determining whether the characteristics of the process to which the currently created file handle belongs meet the predetermined determination characteristics includes: judging whether the number of occupied file handles of the process to which the currently created file handle belongs reaches a preset number threshold value or not; and/or judging whether the suffix names of the files corresponding to the file handles occupied by the process to which the currently created file handle belongs are the same or not; and/or judging whether different paths exist in the paths of the files corresponding to the occupied file handles in the process to which the currently created file handles belong; if the characteristics of the process to which the currently created file handle belongs meet the predetermined judgment characteristics, determining that the process to which the currently created file handle belongs is a process of the Lexoer virus, including: if the number of the occupied file handles reaches a preset number threshold value and/or the suffix names of the files corresponding to the occupied file handles are the same and/or different paths exist in the paths of the files corresponding to the occupied file handles, the characteristics of the process to which the currently created file handles belong are determined and meet preset judgment characteristics.
According to a specific implementation manner of the embodiment of the present invention, if the attribute of the currently created file handle has write permission, the method further includes: copying a currently created file handle; and carrying out encryption backup on the file corresponding to the currently created file handle.
According to a specific implementation manner of the embodiment of the present invention, after determining that the process to which the currently created file handle belongs is a process of a lemonade virus, the method further includes: and recovering the file encrypted by the Lexoer virus by using the encrypted backup file.
In a second aspect, an embodiment of the present invention provides a stranger virus defense apparatus, including: the monitoring module is used for monitoring the creation of the file handle; the first judgment module is used for inquiring the attribute of the currently created file handle if the currently created file handle is created, and judging whether the attribute of the currently created file handle has write permission; the query module is used for querying the process to which the currently created file handle belongs if the attribute of the currently created file handle has the write permission; the second judgment module is used for judging whether the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics or not; and the third judging module is used for determining that the process to which the currently created file handle belongs is a process of the Lesoer virus if the characteristics of the process to which the currently created file handle belongs meet the preset judging characteristics.
According to a specific implementation manner of the embodiment of the present invention, the second determining module includes: the first judgment submodule is used for judging whether the number of the occupied file handles of the process to which the currently created file handles belong reaches a preset number threshold value or not; and/or the second judging submodule is used for judging whether the suffix names of the files corresponding to the file handles which are currently established in the process to which the file handles belong are the same or not; and/or the third judging submodule is used for judging whether different paths exist in the paths of the files corresponding to the occupied file handles in the process to which the currently created file handles belong; the third judging module is configured to determine a characteristic of a process to which a currently created file handle belongs if the number of occupied file handles reaches a predetermined number threshold, and/or suffix names of files corresponding to the occupied file handles are the same, and/or paths of files corresponding to the occupied file handles have different paths, and the characteristic conforms to a predetermined determination characteristic.
According to a specific implementation manner of the embodiment of the present invention, the apparatus further includes: the copying module is used for copying the currently created file handle; and the backup module is used for carrying out encryption backup on the file corresponding to the currently created file handle.
According to a specific implementation manner of the embodiment of the present invention, the apparatus further includes: and the recovery module is used for recovering the file encrypted by the Lexoer virus by using the encrypted backup file.
In a third aspect, an embodiment of the present invention provides an electronic device, where the electronic device includes: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes the program corresponding to the executable program code by reading the executable program code stored in the memory, and is used for executing the method of any one of the foregoing implementation modes.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors to implement a method according to any one of the foregoing implementation manners.
According to the method, the device, the electronic equipment and the storage medium for defending against the Lesoxhlet virus, the creation of the file handle is monitored, if the current creation of the file handle is monitored, and the read-write attribute information in the attribute of the currently created file handle is judged to be the write attribute, the characteristic of the process to which the currently created file handle belongs is further judged whether to accord with the preset judgment characteristic, if so, the process to which the currently created file handle belongs can be determined to be the process of the Lesolet virus, and therefore, whether the process to which the currently created file handle belongs is the process of the Lesolet virus can be determined according to the attribute of the currently created file handle and the characteristic of the process to which the currently created file handle belongs, and the Lesolet virus can be timely and effectively identified.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart illustrating a Lexuer virus defense method according to a first embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating a second embodiment of a Lexuer virus defense method according to the present invention;
FIG. 3 is a schematic flow chart illustrating a third embodiment of a Lexuer virus defense method according to the present invention;
FIG. 4 is a flowchart illustrating a fourth embodiment of the method for defending against a Lexuer virus according to the present invention;
FIG. 5 is a schematic structural diagram of a first embodiment of a Lexuer virus protection device according to the present invention;
FIG. 6 is a schematic structural diagram of a second embodiment of the Lexuer virus defense apparatus according to the present invention;
FIG. 7 is a schematic structural diagram of a third embodiment of a Lexuer virus protection device according to the present invention;
FIG. 8 is a schematic structural diagram of a fourth embodiment of a Lexuer virus protection device according to the present invention;
fig. 9 is a schematic structural diagram of an embodiment of an electronic device according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In a first aspect, an embodiment of the present invention provides a method for defending a lemonade virus, which can effectively identify a lemonade virus in time and accurately recover an encrypted file.
Fig. 1 is a schematic flow chart of a first embodiment of a lemonade virus defense method provided by the present invention, and as shown in fig. 1, the method of this embodiment may include the steps of:
s101, the creation of the file handle is monitored.
A handle is a unique integer used to identify an object created or used by an application. Common handles include window handles, device description table handles, memory handles, file handles, process handles, thread handles, and the like. The file handle is the only identification basis of the opened file. To read data from a file, an application needs to call an operating system function and pass the file handle's address in memory and the number of bytes to copy to the operating system function.
In this embodiment, optionally, a file handle may be created through a Hook correlation function, such as ZwCreateFile, to be aware of.
Through monitoring, if the file handle is determined to be created currently, the step 102 is executed, otherwise, the creation of the file handle is continuously monitored.
S102, judging whether the attribute of the currently created file handle has write permission.
In this embodiment, if it is monitored that a file handle is currently created, the attribute of the currently created file handle is queried, and whether the attribute of the currently created file handle has write permission is determined.
The attributes of the file handle may generally include attribute information such as file name, file path, read authority, write authority, etc. According to the attribute of the file handle, whether the opened file has write permission or not can be determined.
In this embodiment, optionally, the attribute information of the file handle may be obtained by using native api zwqueryinformation file
If the attribute of the currently created file handle has write permission, executing step 103, otherwise, continuing to execute step 101.
And 103, inquiring the process of the currently created file handle.
In this embodiment, an ID (identifier) of a process to which the currently created file handle belongs may be obtained first, and the process to which the currently created file handle belongs may be obtained according to the ID.
Optionally, the ID of the process to which the currently created file handle belongs may be obtained through the system snapshot.
And 104, judging whether the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics or not.
In this embodiment, the characteristics of the process to which the currently created file handle belongs include the number of file handles occupied by the process to which the currently created file handle belongs, a suffix name of a file corresponding to the occupied file handle, a path of the file corresponding to the occupied file handle, and the like.
After the ID of the process to which the currently created file handle belongs is obtained, the handle of the process is obtained through an OpenProcess function, and the relevant characteristics of the process can be obtained according to the handle of the process.
The predetermined judging characteristic is a pre-established characteristic or a characteristic library which is consistent with the characteristic of the process of the Lexoplasma virus. The determination feature may be obtained by analyzing a process feature of a large number of lesioner viruses in advance, or may be updated according to a process feature of a newly-appearing lesioner virus.
According to the characteristics of the process to which the currently created file handle belongs, whether the process meets the preset judgment characteristics can be judged. If the characteristics of the process to which the currently created file handle belongs meet the predetermined judgment characteristics, executing step 105, otherwise, continuing to execute step 101.
And 105, determining that the process to which the currently created file handle belongs is a process of the Lexoplasma virus.
In a normal encryption procedure, a selected file is usually encrypted, and the read-write attribute information in the opened file handle attribute is generally read attribute. Because the lemonade virus can directly encrypt the file, the read-write attribute information of the opened file handle attribute is definitely the write attribute, namely has write permission. Therefore, in this embodiment, if it is monitored that a file handle is currently created, and it is determined that read-write attribute information in the attribute of the currently created file handle is a write attribute, it may be preliminarily determined that the process to which the currently created file handle belongs is a process of a suspected lesioner virus, and accordingly, it may be further determined whether the characteristic of the process to which the currently created file handle belongs meets a predetermined determination characteristic, and if so, it may be determined that the process to which the currently created file handle belongs is a process of a lesioner virus.
In this embodiment, it may be determined whether the process to which the currently created file handle belongs is a process of a lemonade virus according to the attribute of the currently created file handle and the characteristics of the process to which the currently created file handle belongs, so that the lemonade virus can be identified in time and efficiently.
After determining that the process to which the currently created file handle belongs is a process of the lemonade virus, the process may be closed and alarm information may be generated.
Fig. 2 is a flowchart illustrating a second embodiment of a method for defending against a lemonade virus according to the present invention, as shown in fig. 2, the difference between the method and the embodiment shown in fig. 1 is that, in this embodiment, the determining whether the feature of the process to which the currently created file handle belongs meets a predetermined determination feature (step 104) may specifically include:
step 1041, judging whether the number of occupied file handles of the process to which the currently created file handle belongs reaches a predetermined number threshold; and/or the presence of a gas in the gas,
1042, judging whether the suffix names of the files corresponding to the file handles occupied by the processes to which the currently created file handles belong are the same; and/or the presence of a gas in the gas,
step 1043, judging whether the paths of the files corresponding to the file handles occupied by the process to which the currently created file handle belongs have different paths;
after judgment, if the number of the occupied file handles reaches a predetermined number threshold value and/or the suffix names of the files corresponding to the occupied file handles are the same and/or different paths exist in the paths of the files corresponding to the occupied file handles in the process to which the currently created file handles belong, executing step 105; wherein the different paths include different paths having the same drive and different paths having different drives.
In this embodiment, the number threshold is preset according to actual conditions, for example, the number threshold may be set to 20, 25, or 30, and the higher the number threshold is, the higher the accuracy is, but if the number threshold is too high, the accuracy is high, but the timeliness of the determination may be affected. In order to balance the accuracy and timeliness of the determination, the number threshold is preferably 20 in this embodiment.
Normal encryption software, which usually encrypts all files or several special files in a path, rarely opens a large number of files with different drives and different paths at a certain time, and rarely has more than 20 file handles with suffixes. That is to say, the paths of opening files by normal encryption software are all files with the same path, and are not files with different drive letters and different paths, and there are rarely more than 20 file handles with suffixes.
While the lemonade virus performs full file scanning and encryption, it is imperative that multiple files be opened simultaneously during run time, have the same suffix name and different paths, and typically open more than 20 files.
Therefore, in this embodiment, the lemonade virus may be determined and identified by determining the number of file handles occupied by the current process, the suffix name, and the path.
When the method is applied specifically, the judgment of the Lexomer virus can be carried out on at least one of the number, the suffix name and the path of the file handle occupied by the current process, and can also be carried out on the number, the suffix name and the path of the file handle occupied by the current process, so that the occurrence of false alarm is reduced or avoided, and the accuracy of judging the Lexomer virus is improved.
When the number, the suffix name and the path of the file handles occupied by the current process are judged, the number of the file handles can be judged first, and the suffix name and the path of the file corresponding to the file handles are judged only when the number of the file handles reaches a preset number threshold (such as 20), so that unnecessary judgment operation can be reduced, the judgment efficiency is improved, and the system resources are saved.
Fig. 3 is a flowchart illustrating a third embodiment of a method for defending against a lemonade virus provided by the present invention, and as shown in fig. 3, the difference from the embodiment of the method shown in fig. 2 is that in this embodiment, if an attribute of a currently created file handle has write permission, the method may further include:
and step 106, copying the currently created file handle.
In this embodiment, after determining that the attribute of the currently created file handle has the write permission, the currently created file handle is copied, so that the file operation permission which is the same as that of the lemonade virus can be obtained, that is, the write permission for the corresponding file can be obtained.
And step 107, carrying out encryption backup on the file corresponding to the currently created file handle.
And immediately carrying out encryption backup on the file corresponding to the currently created file handle according to the obtained write permission.
In the embodiment, after the write permission is determined to exist in the attribute of the currently created file handle, the existence of suspicious lesker viruses can be preliminarily determined, so that the corresponding files can be encrypted and backed up in time to avoid unnecessary loss, and the effect of active defense in advance is achieved.
Fig. 4 is a flowchart illustrating a fourth embodiment of a method for defending against a lemonade virus according to the present invention, and as shown in fig. 4, the difference from the embodiment of the method shown in fig. 3 is that, in this embodiment, after determining that a process to which a currently created file handle belongs is a process of a lemonade virus, the method may further include:
and step 108, recovering the file encrypted by the Lexoplasma virus by using the encrypted backup file.
When the process to which the currently created file handle belongs is found to be a process of the Lexoer virus, all files encrypted by the process can be recovered. When recovering, the encrypted backup file can be decrypted and then replaced with the file encrypted by the Lexoer virus. The file encrypted by the Lexoer virus can be automatically recovered, and a user can be prompted to manually recover the file.
In this embodiment, after malicious encryption is performed on a file by a lesioner virus, the encrypted file of the lesioner virus can be recovered by using the encrypted backup file, so that the protection capability against the lesioner virus is further improved.
More importantly, in this embodiment, when a new file handle is found to be generated and the read/write attribute information in the attribute of the file handle is a write attribute, the file handle is copied and the corresponding file is encrypted and backed up, so that when the file encrypted by the loser virus is restored by using the file encrypted and backed up, the file encrypted by the loser virus can be restored to the state before the loser virus is encrypted, thereby realizing accurate restoration of the encrypted file.
In a second aspect, an embodiment of the present invention provides a device for defending against a lemonade virus, which can effectively identify a lemonade virus in time and accurately recover an encrypted file.
Fig. 5 is a schematic structural diagram of a first embodiment of a stranger virus protection device according to the present invention, and as shown in fig. 5, the protection device of the present embodiment may include: the system comprises a monitoring module 11, a first judging module 12, an inquiring module 13, a second judging module 14 and a third judging module 15; the monitoring module 11 is configured to monitor creation of a file handle; the first judging module 12 is configured to, if a file handle is currently created, query an attribute of the currently created file handle, and judge whether the attribute of the currently created file handle has a write permission; the query module 13 is configured to query a process to which a currently created file handle belongs if the attribute of the currently created file handle has a write permission; the second judging module 14 is configured to judge whether a feature of a process to which the currently created file handle belongs meets a predetermined judgment feature; and the third judging module 15 determines that the process to which the currently created file handle belongs is a process of the lemonade virus if the characteristics of the process to which the currently created file handle belongs meet the predetermined judgment characteristics.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 1, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 6 is a schematic structural diagram of a second embodiment of a stranger virus protection device according to the present invention, and as shown in fig. 6, the difference between the second embodiment of the device and the embodiment of the device shown in fig. 5 is that, in this embodiment, the second determining module 14 includes: a first judgment submodule 141, a second judgment submodule 142 and a third judgment submodule 143; wherein,
the first judging submodule 141 is configured to judge whether the number of occupied file handles in a process to which a currently created file handle belongs reaches a predetermined number threshold; and/or the presence of a gas in the gas,
the second judging submodule 142 is configured to judge whether suffix names of files corresponding to the file handles, which are occupied by the process to which the currently created file handle belongs, are the same; and/or the presence of a gas in the gas,
the third determining sub-module 143 is configured to determine whether different paths exist in paths of files corresponding to the file handles occupied by the process to which the currently created file handle belongs.
The third determining module 15 is configured to determine a characteristic of a process to which a currently created file handle belongs, and meet a predetermined determination characteristic, if the number of occupied file handles reaches a predetermined number threshold, and/or suffix names of files corresponding to the occupied file handles are the same, and/or paths of files corresponding to the occupied file handles have different paths.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 2, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 7 is a schematic structural diagram of a third embodiment of a stranger virus protection device provided by the present invention, and as shown in fig. 7, the difference from the embodiment of the device shown in fig. 6 is that in this embodiment, the device further includes: a copy module 16 and a backup module 17; the copying module 16 is configured to copy a currently created file handle; and the backup module 17 is configured to perform encrypted backup on the file corresponding to the currently created file handle.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 3, and the implementation principle and the technical effect are similar, which are not described herein again.
Fig. 8 is a schematic structural diagram of a fourth embodiment of a stranger virus protection device according to the present invention, and as shown in fig. 8, the difference from the embodiment of the device shown in fig. 7 is that in this embodiment, the device further includes: and the recovery module 18 is used for recovering the file encrypted by the Lexoer virus by using the encrypted backup file.
The apparatus of this embodiment may be used to implement the technical solution of the method embodiment shown in fig. 4, and the implementation principle and the technical effect are similar, which are not described herein again.
In a third aspect, an embodiment of the present invention further provides an electronic device. Fig. 9 is a schematic structural diagram of an embodiment of an electronic device according to an embodiment of the present invention, which may implement the flows shown in fig. 1 to fig. 4 of the present invention, and as shown in fig. 9, the electronic device may include: the device comprises a shell 41, a processor 42, a memory 43, a circuit board 44 and a power circuit 45, wherein the circuit board 44 is arranged inside a space enclosed by the shell 41, and the processor 42 and the memory 43 are arranged on the circuit board 44; a power supply circuit 45 for supplying power to each circuit or device of the electronic apparatus; the memory 43 is used for storing executable program code; the processor 42 executes a program corresponding to the executable program code by reading the executable program code stored in the memory 43, so as to execute the method for protecting against a stranger virus according to any of the foregoing embodiments.
The specific execution process of the above steps by the processor 42 and the steps further executed by the processor 42 by running the executable program code may refer to the description of the embodiments shown in fig. 1 to fig. 4 of the present invention, and are not described herein again.
The electronic device may exist in a variety of forms including, but not limited to, a desktop computer having computing and processing capabilities, a server or other electronic device having computing and processing capabilities.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium storing one or more programs, which are executable by one or more processors, for executing the method for protecting against a lemonade virus described in any of the foregoing embodiments.
According to the method, the device, the electronic equipment and the storage medium for defending the Lesoxhlet virus, if the file handle is currently created through monitoring, and the read-write attribute information in the attribute of the currently created file handle is judged to be the write attribute, the process to which the currently created file handle belongs can be preliminarily judged to be the process of suspicious Lesolet virus, so that the characteristics of the process to which the currently created file handle belongs can be further judged whether to accord with the preset judgment characteristics, and if so, the process to which the currently created file handle belongs can be determined to be the process of the Lesolet virus. That is to say, according to the attribute of the currently created file handle and the characteristics of the process to which the currently created file handle belongs, it can be determined whether the process to which the currently created file handle belongs is a process of the lemonade virus, so that the lemonade virus can be identified timely and effectively.
After the write permission is determined to exist in the attribute of the currently created file handle, the corresponding file can be encrypted and backed up in time, and the function of active defense in advance is achieved.
When the lemonade virus is specifically judged, the number, the suffix name and the path of the file handle occupied by the current process can be judged so as to reduce or avoid the occurrence of false alarm and improve the accuracy of judging the lemonade virus.
Furthermore, after the file is maliciously encrypted by the stranger virus, the file encrypted by the stranger virus can be recovered by using the encrypted backup file, so that the virus defense capability of the stranger is further improved.
More importantly, when a new file handle is found to be generated and the read/write attribute information in the attribute of the file handle is a write attribute, the file handle is copied and the corresponding file is encrypted and backed up, so that when the file encrypted by the Lexoplasma antivirus is restored by using the encrypted and backed-up file, the file encrypted by the Lexoplasma antivirus can be restored to the state before the encryption of the Lexoplasma antivirus, and the accurate restoration of the encrypted file can be realized.
The embodiment of the invention can be applied to any Windows system, does not need to install a specific third-party application program, can process each application program in a silent mode, actively alarms only when finding the stranger virus, and actively recovers the encrypted file.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments.
In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
For convenience of description, the above devices are described separately in terms of functional division into various units/modules. Of course, the functionality of the units/modules may be implemented in one or more software and/or hardware implementations of the invention.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method of protecting against a stranger virus, comprising:
monitoring the creation of file handles;
if the file handle is created currently, inquiring the attribute of the currently created file handle, and judging whether the attribute of the currently created file handle has write permission;
if the attribute of the currently created file handle has the write permission, inquiring the process to which the currently created file handle belongs;
judging whether the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics or not;
and if the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics, determining that the process to which the currently created file handle belongs is the process of the Lexoplasma virus.
2. The method for protecting against a lemonade virus according to claim 1, wherein said determining whether the characteristics of the process to which the currently created file handle belongs meet predetermined determination characteristics comprises:
judging whether the number of occupied file handles of the process to which the currently created file handle belongs reaches a preset number threshold value or not; and/or the presence of a gas in the gas,
judging whether the suffix names of the files corresponding to the file handles occupied by the process to which the currently created file handle belongs are the same or not; and/or the presence of a gas in the gas,
judging whether different paths exist in paths of files corresponding to the file handles occupied by the process to which the currently created file handle belongs;
if the characteristics of the process to which the currently created file handle belongs meet the predetermined judgment characteristics, determining that the process to which the currently created file handle belongs is a process of the Lexoer virus, including: if the number of the occupied file handles reaches a preset number threshold value and/or the suffix names of the files corresponding to the occupied file handles are the same and/or different paths exist in the paths of the files corresponding to the occupied file handles, the characteristics of the process to which the currently created file handles belong are determined and meet preset judgment characteristics.
3. The method of claim 1 or 2, wherein if the attribute of the currently created file handle has write permission, the method further comprises:
copying a currently created file handle;
and carrying out encryption backup on the file corresponding to the currently created file handle.
4. The method of claim 3, wherein after determining that the process to which the currently created file handle belongs is a process of a lemonade virus, the method further comprises:
and recovering the file encrypted by the Lexoer virus by using the encrypted backup file.
5. A stranger virus protection device, comprising:
the monitoring module is used for monitoring the creation of the file handle;
the first judgment module is used for inquiring the attribute of the currently created file handle if the currently created file handle is created, and judging whether the attribute of the currently created file handle has write permission;
the query module is used for querying the process to which the currently created file handle belongs if the attribute of the currently created file handle has the write permission;
the second judgment module is used for judging whether the characteristics of the process to which the currently created file handle belongs meet the preset judgment characteristics or not;
and the third judging module is used for determining that the process to which the currently created file handle belongs is a process of the Lesoer virus if the characteristics of the process to which the currently created file handle belongs meet the preset judging characteristics.
6. The funicular virus defense apparatus according to claim 5, wherein the second determination module comprises:
the first judgment submodule is used for judging whether the number of the occupied file handles of the process to which the currently created file handles belong reaches a preset number threshold value or not; and/or the presence of a gas in the gas,
the second judgment submodule is used for judging whether the suffix names of the files corresponding to the file handles which are currently created belong to the same process; and/or the presence of a gas in the gas,
the third judgment submodule is used for judging whether different paths exist in the paths of the files corresponding to the file handles occupied by the process to which the currently created file handle belongs;
the third judging module is configured to determine a characteristic of a process to which a currently created file handle belongs if the number of occupied file handles reaches a predetermined number threshold, and/or suffix names of files corresponding to the occupied file handles are the same, and/or paths of files corresponding to the occupied file handles have different paths, and the characteristic conforms to a predetermined determination characteristic.
7. The Lessocian virus defence apparatus according to claim 5 or 6, wherein said apparatus further comprises:
the copying module is used for copying the currently created file handle;
and the backup module is used for carrying out encryption backup on the file corresponding to the currently created file handle.
8. The funicular virus defense apparatus of claim 7, wherein the apparatus further comprises:
and the recovery module is used for recovering the file encrypted by the Lexoer virus by using the encrypted backup file.
9. An electronic device, characterized in that the electronic device comprises: the device comprises a shell, a processor, a memory, a circuit board and a power circuit, wherein the circuit board is arranged in a space enclosed by the shell, and the processor and the memory are arranged on the circuit board; a power supply circuit for supplying power to each circuit or device of the electronic apparatus; the memory is used for storing executable program codes; the processor executes a program corresponding to the executable program code by reading the executable program code stored in the memory for performing the method of any of the preceding claims.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores one or more programs which are executable by one or more processors to implement the method of any preceding claim.
CN201811579545.7A 2018-12-21 2018-12-21 Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium Pending CN110874474A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811579545.7A CN110874474A (en) 2018-12-21 2018-12-21 Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811579545.7A CN110874474A (en) 2018-12-21 2018-12-21 Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium

Publications (1)

Publication Number Publication Date
CN110874474A true CN110874474A (en) 2020-03-10

Family

ID=69716309

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811579545.7A Pending CN110874474A (en) 2018-12-21 2018-12-21 Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN110874474A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552962A (en) * 2020-03-25 2020-08-18 沈阳通用软件有限公司 Method for intercepting viruses of files in USB flash disk PE format based on Windows operating system
CN111625828A (en) * 2020-07-29 2020-09-04 杭州海康威视数字技术股份有限公司 Lesovirus defense method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106611121A (en) * 2016-11-01 2017-05-03 哈尔滨安天科技股份有限公司 Method and system for finding extortion viruses based on file format monitoring
CN107480527A (en) * 2017-08-03 2017-12-15 深圳市联软科技股份有限公司 Extort the prevention method and system of software
CN107729752A (en) * 2017-09-13 2018-02-23 中国科学院信息工程研究所 One kind extorts software defense method and system
CN108363923A (en) * 2017-10-19 2018-08-03 北京安天网络安全技术有限公司 A kind of blackmailer's virus defense method, system and equipment
CN108959951A (en) * 2017-05-19 2018-12-07 北京瑞星网安技术股份有限公司 Method, apparatus, equipment and the readable storage medium storing program for executing of document security protection

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106611121A (en) * 2016-11-01 2017-05-03 哈尔滨安天科技股份有限公司 Method and system for finding extortion viruses based on file format monitoring
CN108959951A (en) * 2017-05-19 2018-12-07 北京瑞星网安技术股份有限公司 Method, apparatus, equipment and the readable storage medium storing program for executing of document security protection
CN107480527A (en) * 2017-08-03 2017-12-15 深圳市联软科技股份有限公司 Extort the prevention method and system of software
CN107729752A (en) * 2017-09-13 2018-02-23 中国科学院信息工程研究所 One kind extorts software defense method and system
CN108363923A (en) * 2017-10-19 2018-08-03 北京安天网络安全技术有限公司 A kind of blackmailer's virus defense method, system and equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111552962A (en) * 2020-03-25 2020-08-18 沈阳通用软件有限公司 Method for intercepting viruses of files in USB flash disk PE format based on Windows operating system
CN111552962B (en) * 2020-03-25 2024-03-01 三六零数字安全科技集团有限公司 Interception method of USB flash disk PE format file viruses based on Windows operating system
CN111625828A (en) * 2020-07-29 2020-09-04 杭州海康威视数字技术股份有限公司 Lesovirus defense method and device and electronic equipment
CN111625828B (en) * 2020-07-29 2021-02-26 杭州海康威视数字技术股份有限公司 Lesovirus defense method and device and electronic equipment

Similar Documents

Publication Publication Date Title
JP6703616B2 (en) System and method for detecting security threats
JP4807970B2 (en) Spyware and unwanted software management through autostart extension points
US9886578B2 (en) Malicious code infection cause-and-effect analysis
US11086983B2 (en) System and method for authenticating safe software
US10284587B1 (en) Systems and methods for responding to electronic security incidents
RU2723665C1 (en) Dynamic reputation indicator for optimization of computer security operations
CN111460445B (en) Sample program malicious degree automatic identification method and device
US10216934B2 (en) Inferential exploit attempt detection
US20170171240A1 (en) Method and system for identifying uncorrelated suspicious events during an attack
JP2014038596A (en) Method for identifying malicious executable
KR101937325B1 (en) Method for Detecting and Preventing Malware and Apparatus thereof
GB2485622A (en) Server detecting malware in user device.
US20220292194A1 (en) System, Method, and Apparatus for Preventing Ransomware
WO2021139308A1 (en) Cloud server monitoring method, apparatus and device, and storage medium
US20220309171A1 (en) Endpoint Security using an Action Prediction Model
CN113449302A (en) Method for detecting malicious software
CN110874474A (en) Lessocian virus defense method, Lessocian virus defense device, electronic device and storage medium
KR20160099159A (en) Electronic system and method for detecting malicious code
US20240256658A1 (en) Protecting data against malware attacks using cyber vault and automated airgap control
TWI640891B (en) Method and apparatus for detecting malware
WO2016095671A1 (en) Method and device for processing application-based message
JP6602471B2 (en) Techniques for automated application analysis
WO2021144978A1 (en) Attack estimation device, attack estimation method, and attack estimation program
CN116611058A (en) Lexovirus detection method and related system
US11763004B1 (en) System and method for bootkit detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200310