-
公开(公告)号:US20240256670A1
公开(公告)日:2024-08-01
申请号:US18533339
申请日:2023-12-08
Applicant: Commvault Systems, Inc.
Inventor: Jitin JINDAL , Arun Prasad AMARENDRAN , Raghuveer SAGAR , David M. CUNNINGHAM , Vijayan THANASEKARAN
CPC classification number: G06F21/568 , G06F21/554 , G06F21/566
Abstract: After completion of a backup job, the illustrative system performs a threat analysis of the freshly generated backup copies. Each copy is restored at a secure storage area. The system scans the restored data using, preferably, a signature-based malware scanning engine. If the scan finds malware infection or some other unsafe condition, a tracking index is updated to indicate that the copy is unsafe, and the secondary copy is quarantined. The quarantine prevents the copy from being restored to the production environment, and from acting as a source for other copies. The system iterates, scanning preceding versions of the copy, updating the index, and quarantining, until a clean or uninfected copy is found. The clean copy is so indexed. Responsive to a restore request, the illustrative system automatically restores the clean copy and skips over the infected copy/copies, preferably without asking the requesting user for input or approval.
-
公开(公告)号:US20240143759A1
公开(公告)日:2024-05-02
申请号:US17975409
申请日:2022-10-27
Applicant: Commvault Systems, Inc.
Inventor: Jitin JINDAL , Arun Prasad AMARENDRAN , Chandan SINGH , Gopikannan VENUGOPALSAMY , Yongtao LIU
IPC: G06F21/56
CPC classification number: G06F21/566 , G06F21/568
Abstract: Backup data is leveraged to determine whether primary data has been encrypted by malware. The disclosed approach does not rely on recognizing particular malware instances or malware provenance, and thus can be applied to any body of data. Even a novel and previously unknown malware attack can be detected in this way. An illustrative data storage management system analyzes secondary copies it created over time, applies a multi-factor analysis to data recovered from the secondary copies and, based on the analysis, infers whether the primary data from which the secondary copies were created may be encrypted. The present approach uses successive versions of backup copies to find indicia of malware encryption, rather than trying to trace or identify the malware itself. Indicia of entropy correlate highly with encryption, such as encryption performed by malware attacks. Conversely, indicia of similarity correlate highly with lack of encryption of successive versions of documents.
-