Malware News Top 5: Things to know about fileless attacks

LASER_oneXM

Level 37
Thread author
Verified
Top Poster
Well-known
Forum Veteran
Feb 4, 2016
2,516
15,624
3,578
53
Germany / Poland
April 26, 2018, 5:30 AM PST
Fileless attacks are particularly tricky because they don't require anything to be installed before causing harm. Here are the basics you should know about this type of threat.

Securing your company does mean stopping malware. But in the ever evolving security war, bad actors are turning to what are called fileless attacks that don't require a payload or tricking someone into installing them.

Easy for the bad people, but harder for you.

Here are five things to know about fileless attacks:

1. They masquerade inside trusted software.
According to Carbon Black's 2017 Threat Report, fileless malware attacks leveraging PowerShell or Windows Management Instrumentation tools made up 52% of all attacks for the year.

2. They work by stealing user names and passwords, especially using phishing attacks.
Once you have those especially from high level users. You don't need malware running. The bad folks just log in on domain accounts or as an IP administrator and take what they want.
....
....
....
 
So which specific processes should be blocked, in order to control WMI?
Sorry, wrong wording. I only disable WMI service, it is only a partial protection against WMI attacks, going all the way would also require to disable Task Scheduler service, but that would cripple updating certificates and much much more.
 
So which specific processes should be blocked, in order to control WMI?
Blocking all possibilities of using WMI by the attackers would be not very usable. Some WMI classes are not available when UAC is turned ON, so there is another reason for keeping it ON.
.
Most WMI attacks are performed via scripts/scriptlets/macros. So, the best method is disabling/restricting the above. This is also related to blocking active content in documents, etc.
 
Blocking scrcons.exe (WMI Standard EventConsumer - scripting application) can help in some cases - such script attack method is hard to detect (used by the attackers in the wild). One can also prevent payload execution from the script by blocking process execution from WmiPrvSE.exe (like in NVT OSArmor). But there also some other WMI methods left.
The more comprehensive solution will be for sure Comodo Firewall (or another good default-deny protection).:)
 
Last edited:
SRP can be used in a wide spectrum of restrictions. It can be applied as a prophylactic solution up to highly restricted one (unusable for most users) - too much medicine is not healthy.
Using basic SRP settings as a backup for a free AV (Defender, Avast, etc.) is a good solution.
Comodo Firewall is another example - using HIPS + Firewall + Sandbox with some advanced settings, could probably stop all malware in the wild (except kernel exploits). But, in the end, no one uses Comodo Firewall in this way.
The most promising solution is keeping the balance between the level of security, knowledge and healthy habits.
 
Appguard or VS are also useful against fileless attacks
AppGuard is SRP + light Sandboxing (guarded applications), so is useful against all kinds of malware.
VoodooShield is Anti-Exe + some other smart functions (like MS Office application anti-exploit), and can also prevent most fileless attacks. Both are smart default-deny solutions.
.
But, home users should know, that in the home environment, 99% of the fileless attacks, start in fact from:
  • some malicious files (with embedded active content) that users downloaded to the disk. The common infection vector is via e-mail document attachments (DOC, RTF, PDF, etc).
  • malicious websites + exploited web browser.
The fileless is not magic, it can be prevented by home users, when using well known methods, like:
  • opening unsafe documents with blocked active content (protected view),
  • adopting secure DNS, Ad-blocker, anti-phishing,
  • using web browser with a good sandbox (Edge, Chrome) or protecting web browser by sandboxing application (ReHIPS, Sandboxie),
  • using anti-spam filters,
  • using TBC (Think Before Clicking) to avoid CAC (Cry After Clicking)
  • etc.
 
Last edited:
AppGuard is SRP + light Sandboxing (guarded applications), so is useful against all kinds of malware.
VoodooShield is Anti-Exe + some other smart functions (like MS Office application anti-exploit), and can also prevent most fileless attacks. Both are smart default-deny solutions.
.
But, home users should know, that in the home environment, 99% of the fileless attacks, start in fact from:
  • some malicious files (with embedded active content) that users downloaded to the disk. The common infection vector is via e-mail document attachments (DOC, RTF, PDF, etc).
  • malicious websites + exploited web browser.
The fileless is not magic, it can be prevented by home users, when using well known methods, like:
  • opening unsafe documents with blocked active content (protected view),
  • adopting secure DNS, Ad-blocker, anti-phishing,
  • using web browser with a good sandbox (Edge, Chrome) or protecting web browser by sandboxing application (ReHIPS, Sandboxie),
  • using anti-spam filters,
  • using TBC (Think Before Clicking) to avoid CAC (Cry After Clicking)
  • etc.

Also good to know. You folks are so helpful to the less technically inclined!(y)
 
  • using TBC (Think Before Clicking) to avoid CAC (Cry After Clicking)

I know well everything else you said. But is there a specific software for this? I doubt it has yet been invented. Unfortunately ... I do not think so. The basics of education are lacking.
 
  • Like
Reactions: shmu26
I know well everything else you said. But is there a specific software for this? I doubt it has yet been invented. Unfortunately ... I do not think so. The basics of education are lacking.
The MalwareTips & Wilderssecurity forums are good starting points for everyone.:)(y)
 
@Andy Ful
You are definitely right. But do you know someone who reads the instructions of household appliances, the dosage of medicines, Ikea instructions? Do you really think they are reading MT or WS? If it were for me, I would put it as a lesson at school.
 
You are definitely right. But do you know someone who reads the instructions of household appliances, the dosage of medicines, Ikea instructions? Do you really think they are reading MT or WS? If it were for me, I would put it as a lesson at school.
That is right, if we are talking about the average users. Security issues are completely abandoned in teaching the Informatics and computer corporation training.
 
@Andy Ful
do you know someone who reads the instructions of household appliances, the dosage of medicines, Ikea instructions? Do you really think they are reading MT or WS?

zZf4EvWq_o.jpg
:giggle: