Cybercriminals are increasingly becoming more adept at finding new and sophisticated ways to avoid being detected. Apart from the rise in ransomware attacks, there has also been an increase in the number of fileless attacks, which pose a threat to organizations and a challenge for security solutions due to the use of sophisticated attack techniques and various non-executable file formats.
The increase in fileless attacks can be attributed to a few reasons: for one, the malicious logic of the attack often occurs in memory, making traditional static detection insufficient. It also complicates post-event analysis because it’s easy for attackers to hide behind. For these and other reasons, various endpoint security solutions have included additional capabilities to combat these types of threats.
Fileless Attacks Explained
The term “fileless attack” encompasses several possible attack scenarios, only some of which don’t write any files to disk, while very few scenarios are completely fileless. Here are some widely accepted definitions of a fileless attack:
Executable-less attacks: Attacks based on a dropper, usually a document or scripts, which is written to disk, and then executes the next stages of the attack. These are the most common forms of fileless attacks.
Dual-use attacks: Attacks based on legitimate files that are either common to the organization attacked or are widely used administrative tools, which can be abused to perform malicious functions. These files are usually written to disk but can also be used as memory payloads.
Code injection attacks: Attacks based on code injection, which are loaded dynamically into the memory of a process.
Combating Fileless Attacks
The increasing awareness of these types of attacks is making it more difficult for attackers to successfully perform them. Moreover, there are some steps organizations and users can take to protect themselves and lessen the likelihood of becoming infected:
With that in mind, it’s important to understand that, due to the growth in knowledge of both users and security vendors, malicious actors are expected to increase both the number of fileless attacks and the sophistication level of them while developing new ways through which fileless attacks can be conducted.
The best defense is to be aware of the different types of fileless attacks and their respective malicious logic, and to build out your arsenal of defenses based on that knowledge.
Share With Your Community:
*** This is a Security Bloggers Network syndicated blog from RSAConference Blogs RSS Feed authored by RSAConference Blogs RSS Feed. Read the original post at: https://www.rsaconference.com/industry-topics/blog/strategies-for-dealing-with-fileless-malware-attacks
When it comes to detecting phishing and social engineering threats, slow response times are detrimental. Automate online brand protection to take…
Interesting development in Germany to restore phonetics that were erased by the Nazis Before the Nazi dictatorship some Jewish names…
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…
via the comic delivery system monikered Randall Munroe resident at XKCD! Permalink
Many thanks to DEF CON and Conference Speakers for publishing their outstanding presentations; of which, originally appeared at the organization's…
It's December, so you know what that means: Predictions for what's to come for cyber in 2021. We brought together…