Talks @ RSAC 2019: Fileless Malware and How to Detect Them

Fileless malware is becoming more prevalent. Here’s what you need to know, according to a session at RSAC 2019 RSA Conference is where thousands of attendees get together to discuss the latest on cybersecurity threats, tactics and solutions. Wit… Continue reading Talks @ RSAC 2019: Fileless Malware and How to Detect Them

For many crooks, malware is out and PowerShell attacks are in, IBM says

Digital thieves are ditching traditional forms of cybercrime in favor of more subtle techniques that apparently help them avoid detection, IBM says. Scammers are moving away from the use of malicious software, opting instead to exploit administrative tools to target business and organizations, according to a report published Tuesday by the company’s X-Force Threat Intelligence team. Nation-state hacking groups appear to have started the trend, but it seems to have spread throughout the broader cybercriminal black market. FireEye said in 2017 it detected a suspected Iranian group using similar techniques to collect reconnaissance about global critical infrastructure companies. IBM’s report says such tactics are everywhere now. Fifty-seven percent of the attacks IBM detected used common, otherwise benign applications like PsExec or PowerShell, a tool that can execute code from memory. Just 29 percent used more traditional phishing attacks. IBM says. This tactic enables hackers to evade antivirus protection and other common security controls. “PowerShell is useful in data […]

The post For many crooks, malware is out and PowerShell attacks are in, IBM says appeared first on CyberScoop.

Continue reading For many crooks, malware is out and PowerShell attacks are in, IBM says

DarkVishnya: Banks attacked through direct connection to local network

In 2017-2018, Kaspersky Lab specialists were invited to research a series of cybertheft incidents. Each attack had a common springboard: an unknown device directly connected to the company’s local network. Continue reading DarkVishnya: Banks attacked through direct connection to local network

What is Fileless Malware?

Fileless malware is a form of cyberattack where the malicious software that enters your computer system resides within volatile storage components such as RAM. It is distinguished from traditional memory-resident malware that generally required access … Continue reading What is Fileless Malware?

Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Removing the need for files is the next progression of attacker techniques. While fileless techniques used to be employed almost exclusively in sophisticated cyberattacks, they are now becoming widespread in common malware, too.
The post Out of sight b… Continue reading Out of sight but not invisible: Defeating fileless malware with behavior monitoring, AMSI, and next-gen AV

Fileless malware: getting the lowdown on this insidious threat

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical … Continue reading Fileless malware: getting the lowdown on this insidious threat

Fileless Threat CactusTorch Abuses .NET to Infect Systems

Over the past several months, security researchers have observed increased activity from a malware threat called CactusTorch that uses fileless techniques and reputable Windows executables to avoid detection. The malware program loads shellcode directl… Continue reading Fileless Threat CactusTorch Abuses .NET to Infect Systems

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing proliferation of “fileless malware” &#82… Continue reading Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]