Fileless malware: Invisible threat or scaremongering hype?

Discussion in 'malware problems & news' started by Minimalist, Nov 17, 2017.

  1. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,649
    Location:
    U.S.A.
    True depending on the HIPS used. I believe Eset uses its kernel mode .dll driver stubs to do so. And again a specific HIPS rule needs to be created to monitor the process. I have one for svchost.exe since that is a favorite process hollowing target.
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,909
    Location:
    Slovenia, EU
    Fileless attacks designed to disguise malicious activity up 265%
    https://www.helpnetsecurity.com/2019/08/30/fileless-attacks-surge/
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,649
    Location:
    U.S.A.
    One statistic that has remained constant in recent years:
    That is 90%+ of malware is delivered via e-mail to corps..
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.