Fileless malware: getting the lowdown on this insidious threat

Credit to Author: Vasilios Hioureas| Date: Wed, 29 Aug 2018 16:48:35 +0000

In this series of articles, we provide an in-depth discussion of fileless malware and their related attacks. In part one, we cover a brief overview of the problems with and general features of fileless malware, laying the groundwork for technical analysis of various samples employing fileless and semi-fileless methods.

Categories:

Tags:

(Read more…)

The post Fileless malware: getting the lowdown on this insidious threat appeared first on Malwarebytes Labs.

Read more

Machine learning vs. social engineering

Credit to Author: Windows Defender ATP| Date: Thu, 07 Jun 2018 13:00:56 +0000

Machine learning is a key driver in the constant evolution of security technologies at Microsoft. Machine learning allows Microsoft 365 to scale next-gen protection capabilities and enhance cloud-based, real-time blocking of new and unknown threats. Just in the last few months, machine learning has helped us to protect hundreds of thousands of customers against ransomware,

Read more

Read more

Now you see me: Exposing fileless malware

Credit to Author: Windows Defender ATP| Date: Wed, 24 Jan 2018 14:00:21 +0000

Attackers are determined to circumvent security defenses using increasingly sophisticated techniques. Fileless malware boosts the stealth and effectiveness of an attack, and two of last years major ransomware outbreaks (Petya and WannaCry) used fileless techniques as part of their kill chains. The idea behind fileless malware is simple: If tools already exist on a device

Read more

Read more

Windows Defender ATP machine learning and AMSI: Unearthing script-based attacks that ‘live off the land’

Credit to Author: Windows Defender ATP| Date: Mon, 04 Dec 2017 14:00:07 +0000

Scripts are becoming the weapon of choice of sophisticated activity groups responsible for targeted attacks as well as malware authors who indiscriminately deploy commodity threats. Scripting engines such as JavaScript, VBScript, and PowerShell offer tremendous benefits to attackers. They run through legitimate processes and are perfect tools for living off the landstaying away from the

Read more

Read more

Quick Heal Total Security receives BEST+++ certification from AVLab in Fileless Malware Protection Test

Credit to Author: Rajib Singha| Date: Thu, 07 Dec 2017 10:14:28 +0000

AVLab is an independent organization that conducts tests on security software for corporate networks and individual user devices. These tests are conducted by using malicious software, tools, and bypassing security techniques that are used in real cyberattacks. In October 2017, AVLab conducted a Fileless Malware Protection Test. In this test,…

Read more

A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs

Credit to Author: Quick Heal Security Labs| Date: Tue, 10 Oct 2017 05:39:51 +0000

Spam email campaigns have increased with the use of multiple random techniques which improve the efficiency of payload distribution to spread malware to more number of users. These attacks have been randomly observed to have increased rapidly in numbers; similar techniques, observed first time in mid-2014, were used in the…

The post A fileless malware uses a unique technique – an analysis by Quick Heal Security Labs appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

An analysis of the fileless malware by Quick Heal Security Labs

Credit to Author: Quick Heal Security Labs| Date: Tue, 08 Aug 2017 12:16:09 +0000

The fileless malware is a malware family that does not leave any trace of its infection in the affected file system. Also known as the ‘memory resident virus’, this type of malware hides in the registry and memory making it difficult for traditional antivirus software to identify the infection. However,…

The post An analysis of the fileless malware by Quick Heal Security Labs appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more