Threat P.J.SHP-iT.7

URI: P.J.SHP-iT.7

Package: Network

< prev | next >

Description: Malware infection installs back door in process Process: if Process is infected by malware, it may install a back door in Process, which could be accessed remotely at a later time.

Threat Type: Primary Threat

Matching Pattern:

P.J.SHP-iT.7
MP-SHP-iT

Finds a non-trivial Process running on a shell Host, and optionally the interactive process user and host manager.

        (empty)

        (empty)

        (empty)

        (empty)

CSG-SuspendInfectedProcess

Process Process may be temporarily disabled by the manager of its host HostManager to prevent it being exploited should it become infected by malware. This strategy represents a contingency plan, which can be used to reduce risk from some threats but it may triggers other threats representing possible side effects, depending on how likely it is that the contingency plan will need to be activated.

CSG-SuspendInfectedProcess-Implementation-Runtime

Process Process has been disabled by the manager of its host HostManager to prevent it being exploited after being infected by malware. This strategy represents activation of a contingency plan at runtime, and can be selected to discover what effect this would have on risk levels, allowing this to be used for decision support calculations. To activate it at runtime, signal user HostManager who is responsible for managing the device hosting Process. The Disabled Process control should be deselected only when the process has been restarted.