Invention Grant
- Patent Title: Application-based file exfiltration detection
-
Application No.: US17242843Application Date: 2021-04-28
-
Publication No.: US11720702B2Publication Date: 2023-08-08
- Inventor: Rob Juncker , Neil Kulevsky , Andrew Moravec , James Sablatura , Shane Zako
- Applicant: Code42 Software, Inc.
- Applicant Address: US MN Minneapolis
- Assignee: Code42 Software, Inc.
- Current Assignee: Code42 Software, Inc.
- Current Assignee Address: US MN Minneapolis
- Agency: Schwegman Lundberg & Woessner, P.A.
- Main IPC: G06F21/62
- IPC: G06F21/62 ; G06F21/52 ; G06F16/17 ; G06F16/176

Abstract:
Disclosed in some examples are methods, systems, and machine readable mediums for applications that detect indicators of data exfiltration through applications such as browser-based interfaces. The disclosed system monitors file system element events related to one or more target applications (such as browsers) through operating system interfaces. Once an event of interest is detected, the system interfaces with the browser to determine a context for the event of interest that may include a URL of a website that the user was visiting corresponding to the file system element event. If the URL is directed towards a prohibited site, a notification may be generated that may be used as a signal to alert an administrator. As used herein, a file system element may include a file, directory, folder, archive, blob, raw storage, metadata, or the like File system element events may include copying, deleting, modifying, or moving a file system element. A file system element event may be detected by monitoring Input/Output requests of a computing device to write to a file; move a file; delete a file; or the like.
Public/Granted literature
- US20220350905A1 APPLICATION-BASED FILE EXFILTRATION DETECTION Public/Granted day:2022-11-03
Information query