User:Baker232/sandbox
Security framework for storage protection against malware attacks on hosts | |
Status | In force (Recommendation) |
---|---|
Year started | 2023 |
First published | November 13, 2023 |
Latest version | 1.0 November 13, 2023 |
Organization | ITU-T |
Committee | ITU-T Study Group 17 |
Series | X |
Related standards | X.1205, X.1207, X.1218, X.1526 |
Domain | Cybersecurity, Data Security |
Website | www |
X.1220 is an International Telecommunication Union (ITU) standard for storage protection against malware. Malware, including ransomware, can hide and infect files. When a user executes a infected file, the malware spreads out to all stored files in connected network. Malware can encrypt, copy, tamper with, and delete files which damages computer systems.
This standard, X.1220, suggests a new definition "Storage Protection" to construct a new protection layer of storage. The protection layer works in a whitelist process. If a pre-registered application requests data, the protection layer gives read-write real data. Otherwise, the protection layer gives read-only fake data.[1] Malware cannot change read-only data, so users can keep network storage safe against malware.
Purpose
[edit]The purpose of this standard is to provide a technique to protect data from malware. Malware bypasses network and endpoint protection layers by following methods.(e.g., Encrypted Traffic, Zero-Day Exploits, Polymorphic Malware, Fileless malware, human error that has been guided by Social Engineering). So this standard defines and explains the criteria of non non-bypassable extra protection layer, which is the storage protection layer.
History
[edit]- February 23. 2023: 3rd Revised baseline text for X.spmoh[2]
- November 13, 2024: Redesignated as X.1220 by ITU-T.(X.spmoh) [3]
Cases of Malwares
[edit]- NotPetya (2017)
- WannaCry (2017)
- Colonial Pipeline ransomware attack (2021)
- Delta County Memorial Hospital data breach[4] (2024)
- Codefinger Ransomware[5] (2025)
In 2024, ransom costs increased 5 times that of ransom bills in 2023.[6]
Process of Protection
[edit]This security framework contains a host and a storage protection server. The storage protection server does not belong to the host like Cloud storage or File-hosting service.
References
[edit]- ^ https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=15709
- ^ https://www.itu.int/md/meetingdoc.asp?lang=en&parent=T22-SG17-230221-TD&question=Q4/17&source=Editor
- ^ https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=15709
- ^ https://www.deltacountyindependent.com/news/delta-health-hospital-announces-security-incident-possibly-involving-patient-information-data-leak/article_42005ab2-e27d-11ef-a975-e39ca3b00683.html
- ^ https://ctomagazine.com/codefinger-aws-ransomware-attack-lessons
- ^ https://www.sophos.com/en-us/content/state-of-ransomware