Hi, Mi Fans! How are you all?
Friends, in the previous thread, I explained about what the FileLess Malwares are and how they work. Incase you missed it, click here to read my previous thread so you can understand this thread even better! Friends, We hear a lot about how cyber security is gaining more strength and how new technology is at it's peak then why the cyber attacks like Ransomeware happens? It's because, criminals adapt to keep pace in the same way that organizations adapt. With a veritable renaissance in technology use under way, criminals have been advancing their methods of attack just like organizations have been advancing their methods for conducting business.
One of the more recent developments in attacker tradecraft is so-called "fileless malware." This trend , which emerged a few years ago but gained significant prominence in late 2016 and throughout 2017 , refers to malware that is designed specifically and architected which to not require or in fact interact with at all with the filesystem of the host on which it runs. There’s no denying that fileless malware are sneaky critters, but the good news is that there are a number of things you can do as a user to minimize the risk of infection. Let' s learn about them in detail.
Keeping Your Apps And Operating System Up To Date:
It may cause compatibility issues with my operating system or other apps
But we’re not in ‘90s anymore. Security updates are crucial for your security! Keeping your apps and OS updated at all times can rule out as many as 85% of targeted attacks (cyber attacks that target a specific vulnerability on your PC).
Windows PowerShell is a native Microsoft tool used for task automation and configuration management. Unfortunately, fileless malware often exploits certain vulnerabilities in PowerShell. If you don’t need to use PowerShell (and most home users probably don’t), use the following steps to disable it:
Monitor Traffic Logs For Suspicious Traffic:
Use An Antivirus With Behavioral Detection:
Adopt The Principle Of Least Privilege:
Blocking The Pages Hosting The Exploit Kit:
Blocking The Payload Delivery:
Blocking The Communication Between Your PC And The Attackers’ Servers:
So, Friends, As using a computer became essential to our lives, we strongly believe that so will cyber security. Not because we’re part of this industry, but because technology is increasingly complex and errors – in the form of vulnerabilities – are unavoidable. Those who gain online security literacy will have the upper hand when it comes to keeping their devices safe and protecting their data, which is increasingly stored and managed online. It is not a rocket science. The steps are very easy to avoid such threats and any one can learn it, do it. You can do it too! And the fact that you have read this thread all the way through is proof!
I would love to know your thoughts on this topic so don't forget to comment in the comment box below. See you soon with one more interesting topic. Till then, take care and stay safe!
Sources : 1 , 2