Hi Mi Fans! I hope you are well and good!
Friends, we all have heard about Ransomware in past few months. Ransomware may have claimed the lion’s share of media headlines in 2017, but there’s another type of attack that has become increasingly common in recent months – fileless malware. As per the recent statistics, Malware is advancing at an unprecedented rate, with four new strains discovered every minute. The rate of fileless malware attacks increased from three percent at the beginning of 2016 to 13 percent last November. This is already a lot for businesses to worry about and it doesn't even cover the other threats that haven't been detected.
Many attackers have evolved their techniques to evade common security solutions in order to cause the most damage to an infected machine and get away with more information, but fileless malware serves up even more of a risk for companies. Fileless malware has been used more recently to bypass traditional file scanning technology and lie undetected within infected machines. Although this type of strain might not be as well covered as other flashy strains, fileless malware is a hidden threat that should concern businesses. We'll see in depth what it is and how does it work?
What Is Fileless Malware?
So, if fileless malware isn’t stored on your hard drive, where does it live?
1. In your RAM:
2. In the Windows Registry:
How Does It Work?
Here’s a real-life scenario of how a fileless infection could compromise your computer.
As you can see, the payload (the part of malware which performs a malicious action) is injected directly into the process used for the exploitation and run in your computer’s RAM memory. In order to avoid detection by traditional antivirus products, attackers chose not to install a malware program on a disk drive, which could be detected through signature scanning. In order to avoid detection by traditional antivirus products, attackers chose not to install a malware program on a disk drive, which could be detected through signature scanning.
So, Friends ,As using a computer became essential to our lives, we strongly believe that so will cyber security. Not because we’re part of this industry, but because technology is increasingly complex and errors – in the form of vulnerabilities – are unavoidable.Those who gain online security literacy will have the upper hand when it comes to keeping their devices safe and protecting their data, which is increasingly stored and managed online.
It's a vast topic so I can't cover in one thread. Stay tuned for the Part-2 in which I will discuss how to protect your systems from these types of malwares, different protection strategies and about ways to minimize/avoid malware infections with some more points. Don't forget to comment in the comment box below so I can know how much did you like this thread. See you soon with Part-2. Till Then, Take Care!
Sources : 1 , 2 , 3