Detection of unauthorized cryptomining

    公开(公告)号:US12068936B2

    公开(公告)日:2024-08-20

    申请号:US17452219

    申请日:2021-10-25

    Abstract: A processing system of a device having at least one processor may determine that a temperature of the device exceeds a threshold temperature and obtain, in response to the determining, utilization information of the device comprising: processor utilization information, memory utilization information, and network utilization information. The processing system may then detect, from the utilization information of the device, a pattern comprising: a first network utilization burst, a processor utilization exceeding a processor utilization threshold and a memory utilization exceeding a memory utilization threshold over at least a designated period of time following the first network utilization burst, and a second network utilization burst after at least the designated period of time. When the pattern is detected, the processing system may generate an unauthorized cryptomining alert.

    Method and system for detection of phishing emails and suspect malicious executable hyperlinks

    公开(公告)号:US12028374B2

    公开(公告)日:2024-07-02

    申请号:US17373365

    申请日:2021-07-12

    CPC classification number: H04L63/1483 G06N5/04 G06N20/00

    Abstract: Aspects of the subject disclosure may include, for example, receiving, at a device, a message over a communication network from a remote source, determining if the message includes executable code and initiating a virtual machine in an isolated portion of the memory of the device responsive to the determining the message include executable code. Aspects of the subject disclosure further include executing, by the virtual machine, the executable code within the isolated portion of the memory, monitoring, by an artificial intelligence module, activities of the executable code during the executing the executable code and determining if the executable code comprises malicious code responsive to the monitoring activities of the executable code. Aspects of the disclosure further include deleting the executable code from the device in response to a determination that the executable code comprises malicious code. Other embodiments are disclosed.

    METHOD AND SYSTEM FOR DETECTION OF PHISHING EMAILS AND SUSPECT MALICIOUS EXECUTABLE HYPERLINKS

    公开(公告)号:US20230010945A1

    公开(公告)日:2023-01-12

    申请号:US17373365

    申请日:2021-07-12

    Abstract: Aspects of the subject disclosure may include, for example, receiving, at a device, a message over a communication network from a remote source, determining if the message includes executable code and initiating a virtual machine in an isolated portion of the memory of the device responsive to the determining the message include executable code. Aspects of the subject disclosure further include executing, by the virtual machine, the executable code within the isolated portion of the memory, monitoring, by an artificial intelligence module, activities of the executable code during the executing the executable code and determining if the executable code comprises malicious code responsive to the monitoring activities of the executable code. Aspects of the disclosure further include deleting the executable code from the device in response to a determination that the executable code comprises malicious code. Other embodiments are disclosed.

    RANSOMWARE DETECTION AND MITIGATION

    公开(公告)号:US20220318385A1

    公开(公告)日:2022-10-06

    申请号:US17840723

    申请日:2022-06-15

    Abstract: A processing system including at least one processor may detect an accessing of a file, where the accessing comprises a read operation, generate a copy of the file in response to detecting the accessing of the file, and store the copy of the file in a designated storage location. The processing system may further detect a completion of the accessing of the file, apply a checksum operation to the file to generate a checksum in response to detecting the completion of the accessing of the file, determine that the checksum does not match an expected checksum for the file, and generate an alert of a possible manipulation of the file in response to determining that the checksum does not match the expected checksum.

Patent Agency Ranking