×

System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device

  • US 8,918,872 B2
  • Filed: 06/27/2008
  • Issued: 12/23/2014
  • Est. Priority Date: 06/27/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A non-transitory tangible computer readable medium comprising one or more instructions that when executed on a processor configure the processor to performing operations for protecting against the transfer of malicious files to a removable device and the spread of the malicious files to other devices via the removable device, the operations comprising:

  • identifying the removable device coupled to a second device, comprises an alert provided by the first device, wherein the first device provides an alert to the second device when it detects that it is coupled to the second device, wherein the removable device removably couples to the second device using a universal serial bus (USB) port;

    monitoring file copy operations directed toward the removable device;

    detecting an attempt made by a malicious program residing on the second device to transfer a configuration file and an executable file onto the removable device based on the monitoring of the file copy operations directed towards the removable device over the USB port, wherein configuration file is setup information file (INF) file, wherein the malicious program is already present on the second device, before the transfer and is not previously detected by an antivirus program of a security system provided in the second device as malicious due to the second device not having a malware signature for the malicious program, and wherein the security system is configured to scan a plurality of ports, including the USB port, of the second device in order to identify the attempt; and

    reacting, by the security system, in response to the detection of the attempt by;

    providing a user of the second device with an option to prevent storage of the configuration file and the executable file on the removable device by deleting the configuration file and the executable file; and

    in response to the user selecting the option, flagging the malicious program residing on the second device from which the attempt originated for review by the security system;

    reacting includes alerting the user of the second device of the attempt to store the configuration file and executable file, wherein an alerting the user includes providing the user with the option to review the configuration file and the executable file names, and open and view all or part of the configuration file and executable file text.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×