Why Fileless Malware Will Continue Its Rapid Expansion

Fileless malware has received a lot of attention lately, and with good reason. In the last year, fileless malware, also commonly referred to as a zero-footprint attack, has successfully infiltrated a number of financial and other institutions that are… Continue reading Why Fileless Malware Will Continue Its Rapid Expansion

Hancitor: fileless attack with a kernel trick

Evading detection when distributing payloads is a key part of an effective malware campaign. Hancitor shows that it has yet another trick up its sleeve for that.
Categories:

Malware
Threat analysis

Tags: filelessHancitormacromalwarepayloads

Continue reading Hancitor: fileless attack with a kernel trick

Week in security (February 26 – March 4)

Last week in infosec, cryptomining kept chugging along, exploits were spotted in the wild, and a massive DDoS attack targeted GitHub.
Categories:

Security world
Week in security

Tags: filelessgerman governmentmalicious cryptominingtorrentweekly… Continue reading Week in security (February 26 – March 4)

Fileless WannaMine Cryptojacking Malware Using NSA Exploit

By Waqas
Forget WannaCry and welcome WannaMine, a fileless cryptojacking malware using
This is a post from HackRead.com Read the original post: Fileless WannaMine Cryptojacking Malware Using NSA Exploit
Continue reading Fileless WannaMine Cryptojacking Malware Using NSA Exploit

Exploits and fileless malware drive record new malware surge

McAfee released its McAfee Labs Threat Report: December 2017, examining the growth and trends of new malware, ransomware, and other threats in Q3 2017. McAfee Labs saw malware reach an all-time high of 57.6 million new samples – four new samples … Continue reading Exploits and fileless malware drive record new malware surge

Process Doppelgänging attack affects all Windows version & evades AV products

By Waqas
Researchers at endpoint security firm enSilo have identified a new attack
This is a post from HackRead.com Read the original post: Process Doppelgänging attack affects all Windows version & evades AV products
Continue reading Process Doppelgänging attack affects all Windows version & evades AV products

Sharp rise in fileless attacks evading endpoint security

A new Ponemon Institute survey of 665 IT and security leaders finds that over-reliance on traditional endpoint security is leaving organizations exposed to significant risk. 54 percent of respondents said their company experienced a successful attack. Of those respondents, 77 percent were victim to fileless attack or exploit. “This survey reveals that ignoring the growing threat of fileless attacks could be costly for organizations.” said Dr. Larry Ponemon, Chairman and Founder of Ponemon Institute. “The … More Continue reading Sharp rise in fileless attacks evading endpoint security

The anatomy of a completely fileless attack

The use of fileless malware is definitely on the rise, and it’s used both by targeted threat actors and cybercriminals. Trend Micro researchers, though, are keen to explain that there are malware that are fileless only while entering a user’s system (and they eventually reveal themselves when they execute their payload), and there are completely fileless malware attacks, where the entire infection chain is fileless. One example of the latter starts with a downloader Trojan … More Continue reading The anatomy of a completely fileless attack

US restaurants targeted with fileless malware

Morphisec researchers have spotted another attack campaign using fileless malware that is believed to be mounted by the infamous FIN7 hacking group. The goal of the campaign is to gain control of the target businesses’ systems, install a backdoor, and through it perform continual exfiltration of financial information. “Like past attacks, the initial infection vector is a malicious Word document attached to a phishing email that is well-tailored to the targeted business and its day-to-day … More Continue reading US restaurants targeted with fileless malware