'Fileless malware' attacks, used on banks, have been around for years

vemn

Level 6
Thread author
Verified
Malware Hunter
Well-known
Feb 11, 2017
264
Called "fileless malware" attacks because the malware resides only in memory and is mostly hidden, these exploits have been used by unknown cyberthieves to steal from ATMs and customer accounts. However, the full extent of damages isn't always known.
 

viktik

Level 25
Verified
Well-known
Sep 17, 2013
1,492
I was thinking about it.
just recently Kaspersky did detect an autorun malware in memory, but no malicious file was detected on the hard disk.

MALWARE_12-02-2017_09-39-20.jpg
 
Last edited:

vemn

Level 6
Thread author
Verified
Malware Hunter
Well-known
Feb 11, 2017
264
Curious to know how to replicate the case and test against the AV products. =)
Anyone care to share?
 
  • Like
Reactions: Wave
W

Wave

Curious to know how to replicate the case and test against the AV products. =)
Anyone care to share?
Find malware which can be executed without any files being dropped - an example would be through a browser exploit, where the browser will execute the malicious shell-code remotely without any files needing to be dropped. ;)

Good luck finding one, they aren't as common these days. You'll only really find attacks like this when lots of money is involved, and when it's being concealed very well.
 

Kubla

Level 8
Verified
Jan 22, 2017
357
Find malware which can be executed without any files being dropped - an example would be through a browser exploit, where the browser will execute the malicious shell-code remotely without any files needing to be dropped. ;)

Good luck finding one, they aren't as common these days. You'll only really find attacks like this when lots of money is involved, and when it's being concealed very well.

How do we know for sure they aren't any if our commonly used AV solutions can't detect them or at least can't be tested to see if they can?

Perhaps adding something like Heimdal that Parsh mentioned as an additional layer in one's protection scheme would not be a bad idea.
 
Last edited:
  • Like
Reactions: vemn
W

Wave

How do we know for sure they aren't as if our commonly used AV solutions can't detect them or at least can't be tested to see if they can?
The point of a fileless attack is to avoid detection and do things quick - if you drop to the system then the AV scanner will detect the I/O activity through it's file system mini-filter driver and scan the file and then scan the PE which was responsible for dropping it to disk. Unless your security product contains anti-exploit functionality then the chances of it detecting such an attack are slim, and even if they do have anti-exploit, the people doing these attacks can just use another exploit to prevent that detection.

The point of an exploit is to abuse an existent vulnerability for malicious purposes (whether the vulnerability is known to public or not), nothing you can do to stop them all... Hence why they are exploits!
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top