-
Notifications
You must be signed in to change notification settings - Fork 2
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hello, can you explain the detailed procedure on how it creates a back up when it encounters an open syscall? #4
Comments
Just for the information, I'm using this ransomware candidate: https://github.com/DaniAffCH/Ransomware to experiment and basically trying to use the mechanism provided by you to protect the file (have a backup) |
Thank you for your interest in my work. First of all, the Backup Linux kernel module I created must be aware of the file extensions targeted by ransomware. If the ransomware does not attack specific file extensions and encrypts randomly binary files, even files backed up by this module will be infected. As you can see here, when the user opens the target file, It is a hooking flow at main.c. |
Oh, and An essential hypothesis of this recovery module is that 'OPEN' behavior should occur in the Linux kernel. Thank you for introducing me to interesting ransomware. I will experiment with this ransomware as soon as I have time later. |
No description provided.
The text was updated successfully, but these errors were encountered: