×

Computer imposed countermeasures driven by malware lineage

  • US 9,892,261 B2
  • Filed: 04/28/2015
  • Issued: 02/13/2018
  • Est. Priority Date: 04/28/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method of mitigating risk of a cyberattack on an information technology asset, comprising:

  • determining, by a computer system, a value of a plurality of characteristics of a malware software item, where the characteristics comprise at least two of a file path associated with the malware software item, a file name associated with the malware software item, a name of an author associated with the malware software item, an identity of a compiler used to compile the malware software item, a domain name associated with the malware software item, an internet protocol address associated with the malware software item, an email address associated with the software item, and an identity of a programming language used to create the malware software item;

    determining, by the computer system, at least one hash of the malware software item;

    comparing the malware software item, by the computer system, to a plurality of malware families, wherein the comparing comprises at least one of comparing each of the characteristics of the malware software item to a corresponding characteristic of each of the malware families and comparing the at least one hash of the malware software item to each corresponding hash associated with each of the malware families;

    based on comparing the malware software item to the malware families, associating the malware software item to one of the malware families;

    selecting, by the computer system, a countermeasure based on the malware family to which the malware software item is associated; and

    causing the countermeasure to execute to mitigate vulnerability of the information technology asset to the malware software item.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×