Fileless cyber attacks on the rise in 2018: McAfee
Cyber-criminals are increasingly applying fileless attacks in 2018 that leverage trusted Windows executables to invade systems and breach corporate networks, a new report has said.
Cyber-criminals are increasingly applying "fileless" attacks in 2018 that leverage trusted Windows executables to invade systems and breach corporate networks, a new report has said. "Fileless" attacks that dot drop malware on a victis system. Instead, they use tools already installed on computers or run simple scripts and shellcode in memory, often hidden in the Windows Registry.
According to global cyber security firm McAfee Labs, the "fileless" attacks are growing in 2018 as these attacks are launched through reputable executables (or memory) and are hard to detect.
"One fileless threat, CactusTorch, uses the `DotNetToJScript` technique which loads and executes malicious .NET assemblies straight from memory," McAfee said in a statement.
"In 2018, we have seen rapid growth in the use of CactusTorch, which can execute custom shellcode on Windows systems," it added.
Both consumers and corporate users can fall victim to this threat. In corporate environments, attackers use this vector to move laterally through the network. In McAfee`s "Q2 Threat" report, many fileless malware campaigns were discovered to leverage Microsoft PowerShell to launch attacks in memory to create a backdoor into a system -- surging 432 per cent over 2017.
WATCH ZEE BUSINESS VIDEO HERE
"Fileless" malware takes advantage of the trust factor between security software and genuine, signed Windows applications.
Get Latest Business News, Stock Market Updates and Videos; Check your tax outgo through Income Tax Calculator and save money through our Personal Finance coverage. Check Business Breaking News Live on Zee Business Twitter and Facebook. Subscribe on YouTube.