‘Fileless’ cyber attacks on the rise in 2018: McAfee report | HT Tech

‘Fileless’ cyber attacks on the rise in 2018: McAfee report

“Fileless” malware takes advantage of the trust factor between security software and genuine, signed Windows applications.

By: INDO ASIAN NEWS SERVICE
| Updated on: Jul 28 2018, 14:39 IST
According to McAfee Labs, the “fileless” attacks are growing in 2018 as these attacks are launched through reputable executables (or memory) and are hard to detect.
According to McAfee Labs, the “fileless” attacks are growing in 2018 as these attacks are launched through reputable executables (or memory) and are hard to detect. (Benjamin Howell/iStockphoto)
According to McAfee Labs, the “fileless” attacks are growing in 2018 as these attacks are launched through reputable executables (or memory) and are hard to detect.
According to McAfee Labs, the “fileless” attacks are growing in 2018 as these attacks are launched through reputable executables (or memory) and are hard to detect. (Benjamin Howell/iStockphoto)

Cyber-criminals are increasingly applying "fileless" attacks in 2018 that leverage trusted Windows executables to invade systems and breach corporate networks, a new report has said.

"Fileless" attacks that don't drop malware on a victim's system. Instead, they use tools already installed on computers or run simple scripts and shellcode in memory, often hidden in the Windows Registry.

According to global cyber security firm McAfee Labs, the "fileless" attacks are growing in 2018 as these attacks are launched through reputable executables (or memory) and are hard to detect.

"One fileless threat, CactusTorch, uses the 'DotNetToJScript' technique which loads and executes malicious .NET assemblies straight from memory," McAfee said in a statement.

"In 2018, we have seen rapid growth in the use of CactusTorch, which can execute custom shellcode on Windows systems," it added.

Both consumers and corporate users can fall victim to this threat. In corporate environments, attackers use this vector to move laterally through the network.In McA'ee's "Q2 Threat" report, many fileless malware campaigns were discovered to leverage Microsoft PowerShell to launch attacks in memory to create a backdoor into a system -- surging 432 per cent over 2017.

"Fileless" malware takes advantage of the trust factor between security software and genuine, signed Windows applications.

Catch all the Latest Tech News, Mobile News, Laptop News, Gaming news, Wearables News , How To News, also keep up with us on Whatsapp channel,Twitter, Facebook, Google News, and Instagram. For our latest videos, subscribe to our YouTube channel.

First Published Date: 28 Jul, 14:39 IST
NEXT ARTICLE BEGINS