New Delhi: Cyber-criminals are increasingly applying "file-less" attacks in 2018 that leverage trusted Windows executables to invade systems and breach corporate networks, a new report has said.
"Fileless" attacks that dont drop malware on a victim's system. Instead, they use tools already installed on computers or run simple scripts and shellcode in memory, often hidden in the Windows Registry.
According to global cyber security firm McAfee Labs, the "file-less" attacks are growing in 2018 as these attacks are launched through reputable executables (or memory) and are hard to detect.
"One file-less threat, CactusTorch, uses the 'DotNetToJScript' technique which loads and executes malicious .NET assemblies straight from memory," McAfee said in a statement.
"In 2018, we have seen rapid growth in the use of CactusTorch, which can execute custom shellcode on Windows systems," it added.
Both consumers and corporate users can fall victim to this threat. In corporate environments, attackers use this vector to move laterally through the network.
In McAfee's "Q2 Threat" report, many file-less malware campaigns were discovered to leverage Microsoft PowerShell to launch attacks in memory to create a backdoor into a system -- surging 432 per cent over 2017.
"File-less" malware takes advantage of the trust factor between security software and genuine, signed Windows applications.
'File-less' cyber attacks on the rise in 2018: Cyber security firm McAfee Labs
IANS
Updated at:
28 Jul 2018 02:35 PM (IST)
Cyber-criminals are increasingly applying "file-less" attacks in 2018 that leverage trusted Windows executables to invade systems and breach corporate networks, a new report has said.
Image for representational purposes only /AP
- - - - - - - - - Advertisement - - - - - - - - -