{"id":14507,"date":"2019-02-06T07:00:02","date_gmt":"2019-02-06T15:00:02","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/02\/06\/news-8257\/"},"modified":"2019-02-06T07:00:02","modified_gmt":"2019-02-06T15:00:02","slug":"news-8257","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/02\/06\/news-8257\/","title":{"rendered":"The Fileless, Non-Malware Menace"},"content":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 06 Feb 2019 14:00:16 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>There\u2019s an old expression: if it looks like a duck, walks like a duck, and quacks like a duck, then it must be a duck.<\/p>\n<p>What happens, though, if the duck in question is malware that doesn\u2019t behave like typical malware? Namely, it doesn\u2019t drop a file on your disk to infect your computer, hijack system processes, or steal your data, but <em>can do these things without landing<\/em>\u2014even lock your system (as with ransomware) in mid-air, if you will. It\u2019s therefore, a kind of <em>non-malware malware<\/em>, otherwise known as a <em>fileless attack<\/em>. How do you protect yourself from something that doesn\u2019t look, walk, or quack like a malware duck\u2014and yet, is a kind of predatory bird you don\u2019t want flying around in the secret spaces of your computer?<\/p>\n<p>Read on if you\u2019re a hunter of such birds. A big ounce of prevention (in the form of precautions) and a virtual pound of cure (in the form of Trend Micro Security) can help protect you from fileless malware.<\/p>\n<h3><strong>Stealthy Threats in Plain Sight<\/strong><\/h3>\n<p>Fileless threats have been around for years, though lately, such threats are on the rise precisely because fileless attacks are more stealthy and subtle than malware executables dropped on your disk, which can be more readily caught by traditional antivirus software. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Fileless_malware\">Fileless malware<\/a> is \u201cvery resistant to [antivirus] forensic strategies that incorporate file-based whitelisting, signature detection, hardware verification, pattern-analysis, [and] time-stamping, etc.,\u201d because it does not write itself to disk (<em>Wikipedia<\/em>). \u00a029% of attacks faced in 2017 were of the fileless kind, according to a study conducted by the Ponemon Institute, <em><a href=\"https:\/\/cdn2.hubspot.net\/hubfs\/468115\/Campaigns\/2017-Ponemon-Report\/2017-ponemon-report-key-findings.pdf\">The 2017 State of Endpoint Security Risk<\/a><\/em>), up from 20% the year before; while this year it projects that 35% of all attacks will be fileless by year\u2019s end. Trend Micro has also noted this alarming trend in its <em><a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/research-and-analysis\/threat-reports\/roundup\/unseen-threats-imminent-losses\">2018 Midyear Security Roundup<\/a><\/em>, with 24,430 fileless attacks detected in January 2018 rising to 38,189 fileless events by June. Fileless attacks may be stealthy and subtle, but there\u2019s nothing subtle about these rising numbers.<\/p>\n<p>So what, exactly, <em>is<\/em> a fileless attack? It usually starts in a familiar way, with a web popup that instructs you to \u201cupdate\u201d a piece of software (like your Flash Player), so that it \u201cruns properly;\u201d or with a spam or phishing message, which entices you to click on a malicious link, which starts the infection process; or to open what <em>seem<\/em> to be normal files and are anything but. When you do so, the action injects malicious code into your system.<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Approved applications, such as Microsoft Office, are then exploited for malicious intent, enabling the attacker to run his code with the same privileges as the application that\u2019s updating or running.<\/li>\n<li>Interpreted code, such as found in Java and <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/security-technology\/security-101-the-rise-of-fileless-threats-that-abuse-powershell\">PowerShell<\/a>, or a Windows utility, such as Windows Management Instrumentation (WMI) (used for automating system administration tasks), is abused to allow malicious scripts to run, which are then rolled out to the endpoint, without writing to disk.<\/li>\n<li>Legitimate processes are taken advantage of through <em>DLL injection<\/em> (to force the loading of a dynamic-link library, hook system function calls, or read the contents of password textboxes) or through <em>process hollowing<\/em> (replacing some code with the malicious function), which then executes directly in memory and is kept running in the background even after the software is closed.<\/li>\n<li>The Windows Registry is compromised, storing exploit codes in the registry with auto-run capabilities, to ensure the attacks will start afresh behind the scenes, even if you reboot your computer.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The upshot is that fileless attacks can persist undetected in memory or in your system, completely ignored by traditional antivirus programs applying their solutions to malicious files that land on your disk\u2014and your sensitive data is compromised or stolen, pilfered by the cybercriminal, or your computer is locked, as with ransomware. Meanwhile, once established, a network channel may be opened up to the hacker\u2019s command-and-control center for further exploits of your system.<\/p>\n<h3><strong>A Big Ounce of Prevention<\/strong><\/h3>\n<p>So what can you do to guard against fileless attacks?<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Start by educating yourself. There are countless websites, videos, and webinars that you can use to learn more about this ever-expanding threat, the various forms it takes to infect you, and the consequences to your system.<\/li>\n<li>Secure possible points of entry. Fileless malware\u2019s attack vectors are known to be spam email, malicious websites\/URLs (especially if they use an exploit kit), and vulnerable third-party components like browser plug-ins. Use anti-spam and web threat protection (see below).<\/li>\n<li>Be wary of macros. Some Microsoft Office documents when opened prompt you to enable macros (or &#8220;enable content&#8221;). Of course, the safest way is to disable macros to prevent unsecured code from running in your system. However, if enabling macros can\u2019t be avoided, ensure that you disable all but digitally signed macros. With your Microsoft Office document open, go to File &gt; Options &gt; Trust Center &gt; Trust Center Settings &gt; Macro Settings &gt; Disable all macros except digitally signed macros.<\/li>\n<li>Disable unnecessary components. As mentioned, a fileless attack can also come in the form of exploits in vulnerable third-party components like browser plug-ins, or even tools like PowerShell itself. Disabling unused or outdated components can limit the ways an attacker can breach a system or network. Disable built-in Windows tools that you don\u2019t use such as PowerShell. To do this just go to Start &gt; Windows System &gt; Control Panel &gt; Programs &gt; Turn Windows features on or off &gt; Uncheck Windows PowerShell 2.0.<\/li>\n<li>Do not open files (executable files, documents, scripts) from untrusted locations (unknown websites, email attachments), because malicious files can be the instigators to perform fileless attacks through embedded or downloaded payloads.<\/li>\n<li>Always keep everything installed in your system updated. Schedule Windows Updates and other installed software updates weekly.<\/li>\n<li>Install antivirus software that can detect and mitigate fileless threats <em>in memory<\/em>, as well as protect against different layers of malware exposure.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><strong>A Virtual Pound of Cure<\/strong><\/h3>\n<p>For the last precaution, you should install and use <a href=\"https:\/\/www.trendmicro.com\/en_us\/forHome.html\">Trend Micro Security<\/a>, which actually has a low impact on the performance of your system, while providing a \u201cvirtual pound\u201d of cure. Its behavior monitoring, active script analysis, exploit shield, and real-time memory and registry scan enhancements can detect and block the following fileless threats:<\/p>\n<table>\n<tbody>\n<tr>\n<td width=\"20px\"><\/td>\n<td>\n<ul>\n<li>Exploit attacks on approved applications<\/li>\n<li>Script-based attacks using interpreted code such as Java, PowerShell, and WMI<\/li>\n<li>Exploit code stored in registry keys or process memory<\/li>\n<li>Malicious memory operations in legitimate processes, such as reflective DLL injections (loaded from memory) and process hollowing.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<tr>\n<td height=\"10px\"><\/td>\n<td><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Note that legacy systems (such as Windows 2000, XP, and soon Windows 7) are most vulnerable to fileless assaults, reinforcing the brutal fact that old-style, signature-based antivirus engineered to detect malicious files cannot fully protect your system. You need state-of-the-art, multi-layer antivirus that can address these fileless threats. With <a href=\"http:\/\/store.trendmicro.com\/store\/tmamer\/Content\/pbPage.Home\/pgm.4823570300\/?_ga=2.269278900.497763781.1536105347-37918051.1528943605\">Trend Micro Security<\/a> fileless threats have nowhere to hide.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-fileless-non-malware-menace\/\">The Fileless, Non-Malware Menace<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n<p><a href=\"https:\/\/blog.trendmicro.com\/the-fileless-non-malware-menace\/\" target=\"bwo\" >http:\/\/feeds.trendmicro.com\/TrendMicroSimplySecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Trend Micro| Date: Wed, 06 Feb 2019 14:00:16 +0000<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-300x169.jpg\" class=\"webfeedsFeaturedVisual wp-post-image\" alt=\"\" style=\"float: left; margin-right: 5px;\" srcset=\"https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-300x169.jpg 300w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-768x432.jpg 768w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-640x360.jpg 640w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-440x248.jpg 440w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800-380x214.jpg 380w, https:\/\/blog.trendmicro.com\/wp-content\/uploads\/2019\/01\/20180413003111987-230-EJUywuE-800.jpg 800w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>There\u2019s an old expression: if it looks like a duck, walks like a duck, and quacks like a duck, then it must be a duck. What happens, though, if the duck in question is malware that doesn\u2019t behave like typical malware? Namely, it doesn\u2019t drop a file on your disk to infect your computer, hijack&#8230;<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\/the-fileless-non-malware-menace\/\">The Fileless, Non-Malware Menace<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.trendmicro.com\"><\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10413],"tags":[10789,10987,20854,19552,20855,20856],"class_list":["post-14507","post","type-post","status-publish","format-standard","hentry","category-security","category-trendmicro","tag-consumer","tag-exploits","tag-fileless-threats","tag-injections","tag-non-malware-malware","tag-script-attacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14507","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=14507"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/14507\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=14507"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=14507"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=14507"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}