Tag: Fileless Malware
-
LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks
Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that’s distributed via spear-phishing attacks. …
-
Guarding Against Fileless Malware: Types and Prevention
Fileless malware, true to its name, is malicious code that uses existing legitimate programs in a system for compromise. It operates …
-
A new secret stash for “fileless” malware
We observed the technique of putting the shellcode into Windows event logs for the first time “in the wild” during the malicious …
-
APT trends report Q1 2022
This is our latest summary of advanced persistent threat (APT) activity, focusing on events that we observed during Q1 …
-
Hive0117 Continues Fileless Malware Delivery in Eastern Europe
Through continued research into the ongoing cyber activity throughout Eastern Europe, IBM Security X-Force identified a phishing email …
-
‘DarkWatchman’ RAT Shows Evolution in Fileless Malware
A novel remote access trojan (RAT) being distributed via a Russian-language spear-phishing campaign is using unique manipulation of Windows …
-
Encrypted & Fileless Malware Sees Big Growth
A full 91.5 percent of malware was delivered using HTTPS-encrypted connections in the second quarter, researchers said, making attacks more …
-
APT10: sophisticated multi-layered loader Ecipekac discovered in A41APT campaign
A41APT is a long-running campaign with activities detected from March 2019 to the end of December 2020. Most of the discovered malware …
-
Fileless Malware Detections Soar 900% in 2020
Detections of fileless malware soared by nearly 900% year-on-year in 2020 as threat actors worked hard to stay hidden from traditional …
-
Fighting Fileless Malware, Part 3: Mitigations
Last week, in part 2 of this series on fileless attacks, we discussed countermeasures — and how all those countermeasures can be …
-
Fighting Fileless Malware, Part 2: Countermeasures
Even though the term “fileless malware” was only coined recently, fileless attacks have been around for more than three …
-
Fighting Fileless Malware, Part 1: What Is It?
Despite multiple layers of protection, fileless malware cyberattacks remain rampant and difficult to defeat. In this, the first of The …
●●●