Fileless Malware
A 2019 Symantec Internet Security Threat Report revealed that fileless malware is among the leading digital threats. Fileless malware is a malicious software that is different from typical malware threats. Fileless malware is a result of cybercriminals’ efforts to install complex malicious software and files to computers. However, fileless malware does not require files or software to execute and attack. The fileless malware is sneakier than other types of malware because it uses software and applications that are already within an operating system (Zhang, 2018). The malware hides in the system making it unidentifiable. Fileless malware further attacks legitimate scripts while the programs continue to run without the user noticing any malicious activity. Phishing emails and malicious downloads are among the protocols that fileless malware use to attack an operating system. Phishing emails often have links or attachments that when a user clicks on them, they load the PC’s memory. This enables cyber criminals to remotely load codes and steal confidential information.
Fileless malware poses significant security risks because it almost impossible to protect systems against the attacks. Many protection approaches are designed to protect systems against detectable attacks. Some of the approaches employed to protect systems against fileless malwares, such as disabling PowerShell, have other implications because they can compromise productivity. Additionally, fileless malware make systems vulnerable to any form or attack because attackers do not need ways to install malware to a device (Sudhakar, 2020). The fact that the malware cannot be detected makes it dangerous because it can be used to compromise a series of connected devices before it is identified.
It is essential for organizations to frequently update the software on their systems, especially Microsoft applications to ensure no or minimal attacks can be propagated through PowerShell. Organizations should also use multilayer defense mechanisms to protect against fileless malware.
References
Sudhakar, K, S. (2020). An emerging threat Fileless malware: a survey and research challenges.
Cybersecurity, 3, (1). https://doi.org/10.1186/s42400-019-0043-x
Zhang, E. (2018). What is Fileless malware (or a non-malware attack)? Definition and best
practices for Fileless malware protection