Fileless Malware: Master of Disguise

Cyber ​​attack fileless

Share post

Fileless malware is a popular means for cyber criminals to infiltrate systems unnoticed. Also known as non-malware, zero-footprint, or macro-attack, it differs from traditional malware in that it does not need to install malicious software to infect a victim's computer.

Instead, it exploits the existing vulnerabilities on the device: The malware embeds itself in the computer's RAM and uses common system tools for its attacks to inject malicious code into normally safe, trustworthy processes, for example javaw.exe or iexplore.exe .

Attack techniques and how fileless malware works

There are many techniques that cyber criminals can use to launch a fileless malware attack. For example through malicious banner advertising, so-called "malvertising". If users click on the ad, they are redirected to a malicious website that appears legitimate and loads Flash, which unfortunately has vulnerabilities. Flash uses the Windows PowerShell tool to execute commands through the command line while it is running in RAM. PowerShell then downloads malicious code from a botnet or other compromised server and executes it, whereupon the code looks for data to send to the attacker.

Since fileless malware does not require a file download, it is quite difficult to detect, block, and remove. It doesn't have an identifiable code or signature that would allow traditional antivirus programs to detect it. It also has no specific behavior, so heuristic scanners cannot detect it. Since the malware exploits the weaknesses of approved applications that are already on the system, it can also undermine protection through application whitelisting - a process that ensures that only approved applications are installed on a computer.

Signs of fileless malware

However, restarting the computer can stop a security breach by fileless malware. This is because the RAM only retains its data when the computer is on. Once it shuts down, the infection is no longer active. However, attackers can still use this vulnerability to steal data from the computer or install other forms of malware to make the vulnerability persist. For example, a hacker can set up scripts that run when the system restarts to continue the attack.

While there are no new files installed or typical tell-tale behavior that would make a fileless malware attack obvious, there are some warning signs to look out for. One of these is unusual network patterns and traces, such as the computer connecting to botnet servers. Watch for signs of a security breach in system memory, as well as other artifacts that may have been left behind by malicious code.

Best practices for protecting against fileless malware

Here are some steps businesses can take to prevent fileless malware infection or to limit the damage in the event of infection:

  • No unnecessary functions and applications: Services and program functions that are not used should be deactivated. Companies should also uninstall applications that are not used or that are not necessary for work.
  • Economical granting of privileges: Companies should restrict privileges for admin users and only grant users as many authorizations as necessary so that they can do their jobs.
  • Regular software updates: All software should always be up to date and updated regularly.
  • Network traffic monitoring: Network traffic should be monitored and the activity logs checked for abnormalities.
  • Endpoint Protection: Organizations should ensure they have endpoint protection in place and secure each of those devices, including remote and mobile devices, to protect their network.
  • PowerShell: Best practices for using and securing PowerShell should also be followed.
  • Password hygiene: Passwords should be changed after a fileless malware infection becomes known and after successful cleaning.
  • Employee training: In-depth security training for end users can also go a long way in preventing fileless malware infections.

Fileless malware is readily available to criminals because it is often already included in exploit kits. In addition, some hackers offer fileless malware attacks as-a-service. The malware relies on camouflage rather than tenacity, although its flexibility to pair with other malware allows it to do both. Companies should therefore implement a security strategy that includes a layered approach of best practices, security solutions and employee training in order to combat these threats effectively.

 

[starboxid=6]

 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

Cyber ​​attacks increase by 104 percent in 2023

A cybersecurity company has taken a look at last year's threat landscape. The results provide crucial insights into ➡ Read more

Mobile spyware poses a threat to businesses

More and more people are using mobile devices both in everyday life and in companies. This also reduces the risk of “mobile ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

Crowdsourced security pinpoints many vulnerabilities

Crowdsourced security has increased significantly in the last year. In the public sector, 151 percent more vulnerabilities were reported than in the previous year. ➡ Read more

Digital Security: Consumers trust banks the most

A digital trust survey showed that banks, healthcare and government are the most trusted by consumers. The media- ➡ Read more