This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Fileless Malware

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Fileless Malware

A 2019 Symantec Internet Security Threat Report revealed that fileless malware is among the leading digital threats. Fileless malware is a malicious software that is different from typical malware threats. Fileless malware is a result of cybercriminals’ efforts to install complex malicious software and files to computers. However, fileless malware does not require files or software to execute and attack. The fileless malware is sneakier than other types of malware because it uses software and applications that are already within an operating system (Zhang, 2018). The malware hides in the system making it unidentifiable. Fileless malware further attacks legitimate scripts while the programs continue to run without the user noticing any malicious activity. Phishing emails and malicious downloads are among the protocols that fileless malware use to attack an operating system. Phishing emails often have links or attachments that when a user clicks on them, they load the PC’s memory. This enables cyber criminals to remotely load codes and steal confidential information.

Fileless malware poses significant security risks because it almost impossible to protect systems against the attacks. Many protection approaches are designed to protect systems against detectable attacks. Some of the approaches employed to protect systems against fileless malwares, such as disabling PowerShell, have other implications because they can compromise productivity. Additionally, fileless malware make systems vulnerable to any form or attack because attackers do not need ways to install malware to a device (Sudhakar, 2020). The fact that the malware cannot be detected makes it dangerous because it can be used to compromise a series of connected devices before it is identified.

It is essential for organizations to frequently update the software on their systems, especially Microsoft applications to ensure no or minimal attacks can be propagated through PowerShell. Organizations should also use multilayer defense mechanisms to protect against fileless malware.

 

 

References

Sudhakar, K, S. (2020). An emerging threat Fileless malware: a survey and research challenges.

Cybersecurity, 3, (1). https://doi.org/10.1186/s42400-019-0043-x

Zhang, E. (2018). What is Fileless malware (or a non-malware attack)? Definition and best

practices for Fileless malware protection

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask