×

Detecting machines compromised with malware

  • US 8,464,341 B2
  • Filed: 07/22/2008
  • Issued: 06/11/2013
  • Est. Priority Date: 07/22/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. At a host computer system having installed thereon one or more messaging applications that send and receive messages to or from one or more contacts, a method of the host computer system detecting the presence of malware at the host computer system using a decoy contact, the method comprising:

  • an act of installing a decoy contact in a contact store at a host computer system, the contact store being used by a messaging application at the host computer system;

    an act of installing a malware reporting module at the host computer system between the messaging application and a network interface that transmits messages to one or more recipients through a network, the malware reporting module being configured to intercept outgoing messages sent by the messaging application to the one or more recipients through the network prior to the outgoing messages actually reaching the network interface at the host computer system and prior to being received by the one or more recipients;

    an act of the malware reporting module at the host computer system intercepting an outgoing message subsequent to the outgoing message being sent by the messaging application and prior to the outgoing message being received at the network interface;

    an act of the malware reporting module at the host computer system identifying that the outgoing message is addressed to the decoy contact;

    based on identifying that the outgoing message is addressed to the decoy contact, an act of the malware reporting module at the host computer system stopping communication of the outgoing message, such that the outgoing message is prevented from being sent to the network interface; and

    an act of the malware reporting module at the host computer system determining that the host computer system has been compromised with malware based at least in part on identifying that the outgoing message is addressed to the decoy contact and prior to the outgoing message being communicated over the network interface.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×