Security News > 2017 > August > The anatomy of a completely fileless attack (Help Net Security)

The anatomy of a completely fileless attack (Help Net Security)
2017-08-03 19:49

The use of fileless malware is definitely on the rise, and it’s used both by targeted threat actors and cybercriminals. Trend Micro researchers, though, are keen to explain that there are malware that are fileless only while entering a user’s system (and they eventually reveal themselves when they execute their payload), and there are completely fileless malware attacks, where the entire infection chain is fileless. One example of the latter starts with a downloader Trojan … More →


News URL

http://feedproxy.google.com/~r/HelpNetSecurity/~3/xBvM_ttXQhc/