Being Infected with Fileless Malware

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
Indeed, to inject a code in a running process requires that before being carried out some actions. Once the code is in memory, it can perform any action allowed to the same user. If the user has an administrator access of the system, the latter can be completely compromised, but if the account has a limited access will require additional steps to attack the system completely.
So another good reason for not using Admin account.
 

shmu26

Level 85
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Jul 3, 2015
8,153
best protection against fileless exploits is to use safe software and keep it updated. Also keep the OS updated.
and if the software has safety settings, keep them enabled.

If you want to get exploited, run Internet Explorer on Windows XP, and use an old version of MS Office with macros enabled.
 

Winter Soldier

Level 25
Verified
Top Poster
Well-known
Feb 13, 2017
1,486
best protection against fileless exploits is to use safe software and keep it updated. Also keep the OS updated.
and if the software has safety settings, keep them enabled.

If you want to get exploited, run Internet Explorer on Windows XP, and use an old version of MS Office with macros enabled.
A malicious javascript can call a PowerShell encrypted script, and considering that it isn't saved any file, it uses PowerShell to hide the process so the malware is thus more difficult to identify.
You are correct, the first step against fileless malware is to ensure that the system and the browser are secure with updated patches.
Behavior blocker and operating system call control, may also detect unauthorized external connections or access not provided to the Windows registry. In addition, to prevent the execution of harmful PowerShell, the most important thing to verify is scripts have digital signature.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top