• Securencrypt

SE-OPS Ransomware Detection/Prevention Technology and Philosophy

SE-OPS technology and philosophy about Ransomware protection is unlike anything else.


SE-OPS technology and philosophy about Ransomware protection is unlike anything else. It is based in what we call the “Common Sense Actions™” (CSA) that are routinely performed inside a computing device. Our philosophy about Ransomware Protection is that it is infinitely more effective to stop “Harmful Activities” on a computing device than it is to attempt to detect tens of Millions of variants of “Cyber-Threats”.



Comparing Cyber-Threats to Harmful Activities


A Cyber-threat is exactly that.  A Threat to the device or system.  These threats come in millions of

variants, most of them created by an actor with the intent to damage the system, infiltrate and lock

down critical processes or information, or to capture and steal critical data. A Cyber-Threat is; “The

possibility of a malicious attempt to damage or disrupt a computer network or system.” And, there are millions of variants currently in existence and millions more on the way.


A threat becomes a Harmful Activity once it has activated or executed the threat payload and one of these threats begins to adversely affect the device or system. A Harmful Activity is; “Energetic action or movement, Causing or capable of causing harm.” This activity is at the core of SE-OPS Ransomware Protection.


Our philosophy toward Ransomware Protection is actually very simple. Attempting to detect a Threat, in its myriad rapidly mutating forms is far less effective than detecting the initiation of a Harmful Activity.  In essence, a threat is only benign code until it executes a payload, and becomes a Harmful Activity.  Prior to activation, it does nothing to injure the device or system.


Detecting a Harmful Activity is infinitely more precise than attempting to detect a threat. A Harmful

Activity is specific in its logic and intent.  It is easily identifiable as an activity that falls outside of any

Common Sense Action which would be performed by a computing device.   By contrast, a threat may take many forms, including being cloaked in encryption, masking its true intent.  It will likely not be detected until AFTER it executes its threat payload, which means any threat detection has failed in its mission to protect the device or system/network.


Detecting and blocking Harmful Activity is a much more effective and logical approach to Ransomware Protection than any other type of Behavior Based Threat detection.  It is based on “Common Sense Actions™” as explained below.



Common Sense Actions Explained


There are certain processes that Ransomware and Keylogging execute that are not “Common Sense

Actions™” inside a computing device.  There are very basic, simple actions common to all types of

threats that must happen before a threat can execute an effective attack.  For instance, not all

Ransomware is based in file encryption.  Some Ransomware only locks up the windows boot.ini file or other critical systems files.  (Anti-Ransomware that detects only file encryption, or attacking of “bait files” will not detect this activity.)  Because locking up critical systems files is not a “Common Sense Action”, SE-OPS will stop this activity and notify the user of the threat immediately.  This is just one example of hundreds of “Non-Common Sense Actions” that SE-OPS will recognize and stop. 


“Common Sense Actions™” are, simply put, any behavior that falls outside of the norm for the

computing system.  These actions are determined by observing the computing system and determining how it normally works.  Any activity which falls outside of that normal behavior is detected and blocked by SE-OPS technology and the user is notified and allowed to remove the associated threat.  


Will there be some “false-positives”.  Yes, a few. But, we believe that most users and IT Managers will

agree that dealing with a few false positives is much better than dealing with a Ransomware Infection or losing all of your critical login information to a Keylogger.  Besides, once you allow a legitimate program to run, it won’t popup again.


So, what happens when hackers release the next iteration of threat technology? (And, trust us… it’s

coming!) There will be millions of undetected infections worldwide until the new threat can be assessed and new blocking technology created.  Exempt from this, of course, will be SE-OPS users.   



SE-OPS “Common Sense Actions™” Detection Development Theory


Most Behavioral Analysis malware detection software developers utilize a process wherein they

evaluate existing threats and compare the threat’s basic interaction and delivery processes with the

systems they infect.  They then use the information gathered to create their prevention strategies and technology.  We note several issues with this methodology.  Primarily, that this detection method is based on EXISTING, KNOWN threat technology, and the creation process is extremely lengthy and cumbersome.  


Most Threat Detection developers believe that ALL forthcoming threats will use existing technology in one form or another.  They couldn’t be more wrong.  Only by detecting activity that falls OUTSIDE of “Common Sense Actions™” can a cybersecurity product have the best likelihood of detecting a new threat.  This practice is not “Whitelisting”...  far from it.  This is a radical new process for detecting

aberrant behavior in computing systems, not just allowing only specific types of behavior from a

whitelist to be executed as is the case with most other cybersecurity software. 


 

SE-OPS “Fail-Safe” Technology


In addition to the CSA detection system, SE-OPS contains an exclusive “Fail-safe” technology that

prevents the encryption of multiple files/folders and/or multiple changes to any file extension. In the unlikely event that the Ransomware execution was undetected by the behavioral analytics engine, it is impossible for any Ransomware to infect/encrypt multiple files without triggering the fail-safe. Users may still encrypt data with their approved encryption products. SE-OPS will determine that there is a valid encryption process in use, and allow it to execute… within reason, of course.



Why is it Smart to Protect a System from Ransomware at the Device Level?


This is a question that we get frequently when talking to potential clients. Again, we like to keep the

answer simple. Single or Concentrated points of Cybersecurity within a system are easy targets for

cyber-criminals. Protecting each device individually spreads the Cybersecurity throughout many points within the Network.



Single Points/Concentrated Points of Cybersecurity Failure


Certain components inside of a network or system should be observed as either single points or

concentrated points of cybersecurity failure. Common among those are Firewalls and security

appliances. These devices concentrate cybersecurity into a very small and defined space which

intruders/hackers love. These cyber threat counter-measures are focused, easy to locate, and generally operate on well-known technology which generally is subject to multiple, readily available, known exploits. This means that hacking a single point, or in the case of multiple Firewalls and appliances, concentrated points of security, gives the intruder full access to all devices under their protection once the exploit is implemented.


Moving cybersecurity protection to the device level makes defeating the security of an entire network or system much more time consuming and difficult. And, we know that most hackers/intruders are generally lazy or at least focused on the most return on their effort. If there is too much effort involved in hacking one system, they will simply move on to the next, where there is less security.



Detecting or Disabling the SE-OPS Anti-Ransomware Software on a Device


Because most Ransomware attacks are dependent upon many types of unreliable delivery systems,

generally involving some interaction with users, there is little expectation that the threat payload will

always be executed, and that the Ransomware attack will be successful. The intruder or hacker who has created or distributed this Malware has no “expectation” that the attack will actually be triggered by a specific action within the intended target’s system within an allotted time.


SE-OPS Passive nature is undetectable by the Ransomware Payload, and when a successful attack is thwarted, the Ransomware creator does not know why. Cyber-criminals know that sending a successful Ransomware attack into a certain internet web space, IP Range, an email system, or to a network is not an exact science. Because Ransomware attacks are generally not monitored to their endpoint, it is highly unlikely that a cyber-criminal will pursue the reason for a delay in payload execution and discover SE-OPS on the attacked devices. It is even more unlikely that they will determine exactly what technology derailed the attack. The attacker will usually just move on to another target.


SE-OPS cannot be disabled without direct, local administrative authority. Attempting to disable it with Ransomware or remotely will result only in SE-OPS blocking the attempt and/or reinstalling itself immediately.

27 views
Contact Support
Call Sales

888-208-8733