Advice Request Ransomware: how we’re making our protection against it even better.

Please provide comments and solutions that are helpful to the author of this topic.

Nightwater

Level 2
Thread author
Jan 26, 2021
69
Being a developer of cybersecurity: it’s a tough job, but someone’s got to do it (well!).

Our products seek and destroy malware, block hacker attacks, do update management, shut down obtrusive ad banners, protect privacy, and a TONS more… and it all happens in the background (so as not to bother you) and at a furious pace. For example, KIS can check thousands of objects either on your computer or smartphone in just one second, while your device’s resource usage is near zero: we’ve even set the speedrunning world record playing the latest Doom with KIS working away in the background!

Keeping things running so effectively and at such a furious pace has, and still does require the work of hundreds of developers, and has seen thousands of human-years invested in R&D. Just a millisecond of delay here or there lowers the overall performance of a computer in the end. But at the same time we need to be as thorough as possible so as not to let a single cyber-germ get through ).

Recently I wrote a post showing how we beat demolished all competition (10 other popular cybersecurity products) in testing for protection against ransomware – today the most dangerous cyber-evil of all. So how do we get top marks on quality of protection and speed? Simple: by having the best technologies, plus the most no-compromise detection stance, multiplied by optimization ).

av-test-ransomware-1.png


But, particularly against ransomware, we’ve gone one further: we’ve patented new technology for finding unknown ransomware with the use of smart machine-learning models. Oh yes.

The best protection from cyberattacks is multi-level protection. And not simply using different protective tools from different developers, but also at different stages of malware’s activity: penetration, deployment, interaction with the command center, and launch of the malicious payload (and this is how we detect the tiniest of hardly-noticeable anomalies in the system, analysis of which leads to the discovery of fundamentally new cyberattacks).

Now, in the fight against ransomware, protective products traditionally underestimate final stage – the stage of the actual encryption of data. ‘But, isn’t it a bit late for a Band-Aid?’, you may logically enquire ). Well, as the testing has shown (see the above link) – it is a bit too late for those products that cannot roll back malware activity; not for products that can and do. But you only get such functionality on our and one other (yellow!) product. Detecting attempts at encryption is the last chance to grab malware red-handed, zap it, and return the system to its original state!

Ok, but how can you tell – quickly, since time is of course of the essence – when encryption is taking place?

Actually, ransomware encryption has one distinguishing feature: it modifies a great many files all at once. It gives them modified names; non-standard file access methods are used; one and the same suffix is added to all the file names, etc. Our System Watcher module (the one that proactively protected users from WannaCry and many other cyberattacks) keeps track of all file changes on the computer (something like your medical history), and transfers what it finds for analysis into a mathematical model. In its turn, that mathematical model (applying the concept of Human Intelligence), is trained – non-stop – in how to distinguish malicious from legitimate modifications, giving it a high (and increasing) likelihood of recognizing activity of unknown ransomware. And encrypted files can be restored – since reserve copies are made of files with changes made by untrusted processes.

For example, here’s a comparison of predictions in our prototype system, showing (i) clean files, and (ii) files encrypted by Sodin ransomware:




There’s a useful bonus with this technology too…

When checking the trusted processes (including system ones), we can also effectively protect against unknown file-less ransomware (we’ve been catching known file-less malware for ages already). Such ransomware uses legitimate utilities (for example, PowerShell) to execute its commands; moreover, malicious code is contained only in the RAM (so not a trace on the hard drive!), thereby dodging ‘standard detection methods’ of ‘standard antivirus software’ and bogus ‘nextgen protection’.

So there you have it folks: that’s how our prototype tech catches out ransomware without even ‘seeing’ it – only detecting its malicious payload. And that’s how we’ll protect your priceless files… and your digital lives.

But surely this complex technology will use up plenty of resources, no? Not at all! Testing has shown there’s no significant difference in performance when it’s operative.

As I write this, this new tech of ours is undergoing testing on our internal infrastructure, but next year it’ll be ready and included in our products. So, looking forward to that, here’s cheers to that! Stay tuned!…

 

The_King

Level 12
Verified
Top Poster
Well-known
Aug 2, 2020
549
I'm pretty sure I have seen this article posted here just a few days ago.

 
Last edited:

Kiss

Level 4
Verified
Well-known
Oct 6, 2021
174
Very interesting this chart, Kaspersky is arguably the best solution on the market, I'm very curious about your new ransomware protection, which from what Eugene said, will be out in version 2022

what makes me wonder is how F-Secure and Eset are so weak if we look at this chart, even behind Mcafee and Microsoft
 

JoeN

Level 7
Verified
May 10, 2011
318
If this test was commissioned by Kaspersky I am wondering why some vendors like Malwarebytes are not included. As far as I know, they have a big chunk of the business market to which this comparison is aimed. Just wondering ;)
 
Last edited:

ExecutiveOrder

Level 2
Sep 21, 2021
47
If this test was commissioned by Kaspersky I am wondering why some vendors like Malwarebytes are not included. As far as I know, they have a big chunk of the business market to which this comparison is aimed. Just wondering ;)
I think they have been notified which is most likely because of the AV-Test policy (the test was independently developed, executed, and verified by them) and had the chance to opt out. AV-Comparatives enhanced real-world, APT, or 'hacking' test also only a few considered to take a part despite other competing vendors have a good chunk of particular market share.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top