Breaking Down Fileless Malware: Anatomy of an Attack
- by Brittany Day
There’s a new type of cyberattack that is surreptitiously threatening your systems, your data and your business - and this one lives up to every bit of the danger and sophistication conveyed in its name: fileless malware.
This emerging email-borne threat may sound complex and confusing, but we’re here to break it down for you. Let’s explore the anatomy of a fileless malware attack, and examine some measures that your business can take to avoid falling victim to this hidden threat.
What Is Fileless Malware and Why Is It A Threat to My Business?
Fileless malware is a payload-less email attack that runs in a computer's random access memory (RAM), not from a malicious file, and exploits existing, trusted system applications to install and run malicious code on target systems. This code is then used to encrypt and exfiltrate sensitive data, transferring it directly into the hands of the attacker. Fileless malware attacks leverage legitimate, trusted operating system tools for malicious purposes, essentially turning systems against themselves.
Fileless malware - which is most commonly delivered in a phishing email - has become a favorite method among cyber criminals of evading security defenses, eavesdropping on corporate networks, compromising systems and gaining access to sensitive data. Ponemon Institute reports that fileless attacks are 10 times more successful than file-based attacks.
The majority of businesses are unprepared to combat this stealthy emerging threat, and are paying the price in data theft, financial loss, reputation damage and system downtime. In recent years, fileless malware has been the culprit of many notorious security incidents, including the 2017 Equifax breach which compromised the personal information of 147.7 million Americans and the 2016 Democratic National Committee (DNC) hack in which confidential documents and emails from Hillary Clinton’s presidential campaign were leaked by the Russian government.
Unlike traditional malware, fileless malware has no signature because it does not leverage executable files. As a result of this evasive technique, signature-based antivirus software and the majority of traditional email security solutions are unable to detect fileless malware and protect businesses’ critical data, accounts and systems from compromise.
Anatomy of a Fileless Malware Attack
Fileless malware attacks are carried out in a series of clearly-defined steps, beginning with the initial lure of a phishing scam and ending with the compromise of sensitive data. Let’s take a look exactly how fileless malware attacks work, step-by-step, to help you better understand this malicious exploit.
Step 1: Victim clicks on a phishing link
Like traditional file-based malware, fileless malware is most commonly distributed via phishing. When a victim clicks on a malicious URL delivered in a phishing email, he or she is unknowingly led to a fraudulent website.
Step 2: Fraudulent website loads an application that triggers an exploit
The fraudulent website loaded by the victim looks for known vulnerabilities in applications such as Flash or Java, which could be exploited to run malicious code in the browser memory. When the website detects a flaw, it launches the vulnerable application and triggers an exploit.
Step 3: Exploited application launches a LOLBin with command line operating in-memory
The exploited program launches a known and trusted built-in operating system tool, or “LOLBin”, such as PowerShell, Microsoft Office Macros, or WMI, with a command line operating in-memory. This advanced, deceptive technique of essential turning systems against themselves by using legitimate, trusted tools for malicious purposes is known as “living off the land”.
Step 4: Encrypted script identifies target data
The LOLBin that has been launched downloads an encrypted script from the command-and-control server operated by the attacker that is designed to identify target data on the victim’s system.
Step 5: Data is sent directly to the attacker = attack successful
Once the script has identified the target data, it sends it directly to the attacker. Unlike other forms of malware, a fileless malware attack leaves no typical footprint on the target system. The system tools exploited in these attacks can’t be removed or disabled, and re
main running on the system until they’re either told to stop by their operators or they eventually render the system inoperable.
How Can I Prevent an Attack?
When it comes to protecting against fileless malware, there are some behaviors and best practices that users should engage in online to mitigate the risk of an attack. They include:
- Make sure that all software and patches are up-to-date.
- Uninstall applications that are not being used and disable unnecessary services and program features for all necessary applications.
- Restrict admin privileges - only grant the privileges that are necessary for a user to do his or her job.
- Monitor network traffic and check activity logs frequently.
- Require that employees take part in security awareness training.
- In the event that an infection does occur, change passwords immediately once you become aware of the infection and again after disinfection.
- Critically important: Implement a proactive, layered supplementary email security solution that provides real-time protection against fileless malware and other sophisticated modern cyberattacks by creating a safeguarded environment around the user. Selecting a solution that is accompanied by managed services can simplify administration, enhance security and free up valuable IT resources - delivering a rapid return on investment (ROI).
The Bottom Line
Safeguarding your critical assets - and your business as a whole - from fileless malware and other emerging exploits requires adaptive, layered email security defenses. There is an ongoing “cat and mouse” game at play between cyber criminals and security companies - as security defenses evolve, attackers continue to develop new ways to “outsmart” providers. Thus, in order to fortify business email against today and tomorrow’s threats, it is imperative that organizations implement a solution that is constantly learning from the threats that challenge it, and rapidly updating its protection to protect against the latest, most evasive attacks.
Have additional questions about fileless malware? We’re here to help! Leave a comment below and one of our security experts will be in touch with you shortly.
- Thinking Strategically about Email Security in 2021 and Beyond
- There’s a Lot to be Gained with Effective Email Security
- Behind the Shield: EnGarde Cloud Email Security Explained
- Open Source: A Powerful, Yet Underutilized Weapon against Phishing & Zero-Day Attacks
- Buyer's Guide: What to Prioritize in an Email Security Solution
- Buyer's Guide to Office 365 & Workspace Email Security
- EnGarde Cloud Email Security: The Logical Solution to Cyber Risk in Office 365
- Exchange Servers Are Vulnerable - Learn How To Secure Your Email Server Now
- Top Email Security Risks in 2021 - How To Set Your Business Up for Safety & Success
- Ransomware By The Numbers: How Big Is My Risk?
- SMB Ransomware Warnings & How To Prevent an Attack
- Apache SpamAssassin 3.4.6 Release Fixes Two Potentially Aggravating Bugs
- Top Tips and Advice for Staying Safe Online in a Work-from-Home World
- Demystifying Phishing Attacks: How to Protect Yourself Now
- Why Your Business Needs Better Email Security
- Why Ransomware is a Threat to Business
- How to Protect Sensitive Data & Maintain Client Trust in Financial Services Industry
- Why Office 365 Users Are Moving Away from Relying on Default Email Protection Alone
- What You Need to Know to Shield Your Business from Ransomware
- Why You Need DMARC to Secure Email against Spoofing Attacks & Sender Fraud
- Biden's Cybersecurity Efforts Highlight the Power of this Key Technology
- Shortcomings of Endpoint Security in Securing Business Email
- Open Source Utilization in Email Security Demystified
- Limitations of Microsoft 365 Email Security & How To Close These Dangerous Gaps
- DMARC Quarantine vs. Reject: Which Should You Implement to Secure Business Email against Sender Fraud?
- Think Like A Criminal: What You Need to Know About Social Engineering Attacks in 2021
- TLS Email Encryption Explained - How To Encrypt Email with TLS
- Effectively Securing Business Email Accounts: Are Employees the Weakest Link?
- Encryption: An Essential Yet Highly Controversial Component of Digital Security
- Business Email Security Redefined: Key Benefits of Securing Your Business Email with Guardian Digital
- 8 Business Email Security Best Practices
- Demystifying Email Encryption: Stop Sender Fraud
- Demystifying Tax Fraud: How to Avoid Falling Victim to Deceptive, Costly Scams This Tax Season
- Coronavirus Phishing Scams are On the Rise - Is Your Business Email at Risk of Infection?
- Dave Wreski: A Passionate Engineer Brings the Power of Open Source to Business Email Security
- FBI: Existing Cloud Email Protection Inadequate Against Phishing, Ransomware
- Email Risk is Universal: Securing Business Email in Every Industry Sector
- The Remote Worker's Guide to Safely Navigating Office 365
- Why Your Business Needs Superior Email Protection
- Defending Against COVID Email Spoofing Attacks with DMARC
- You’ve Got Mail: How To Tell If It’s Fraud
- Open-Source Security Is Opening Eyes
- Think Like A Criminal: How To Write A Phishing Email
- The Four Biggest Email Threats Your Business Faces Today
- Everything On DocuSign Phishing Attacks in 3 Minutes
- Understanding Payload-Less Email Attacks in Under 3 Minutes
- Demystifying Fileless Malware in Less than 3 Minutes
- Apache SpamAssassin Leads A Growing List of Open-Source Projects Taking Steps to Correct Instances of Racism and White Privilege
- Cyber Risk Is Greater than Ever in the Legal Industry
- Understanding Malicious URL Protection - And Why You Need It to Secure Your Email
- Email Security for SMBs Beyond COVID-19
- Email Risk Is BIG for SMBs - How To Protect Your Business Now
- Why Email Security Is More Important Than Ever in This 'New Reality'
- The Threat of CEO Fraud Extends Beyond the C-Suite
- Top Email Security Trends Putting Your Business at Risk of Attack
- Managed Services: A Key Element of Effective Email Security that Even Modern Solutions Lack
- How to maintain security when employees work remotely: Advice from Leading Security Experts
- FBI: The 2020 Presidential Election Is Under Attack by Email Scammers
- AT&T Security Researchers Identify a Correlation between Strong Cybersecurity and Business Success
- The Aftermath of a Cyberattack Pt. 1: Phishing Recovery Basics
- It Pays to be Prepared! Ransomware Preparedness & Recovery Basics
- Breaking Down Fileless Malware: Anatomy of an Attack
- Keep the Holidays Merry & Bright - Beware of These Sneaky Seasonal Phishing Scams
- Migrating Business Email: The Hidden Complexities You Need To Know
- SPF, DKIM & DMARC: Definition & How They Secure Email Against Sender Fraud?
- Your Current Approach to Email Security May Not Be Enough
- Ways to Prevent Email Account being compromised in a Breach
- Celebrating 20 Years of Revolutionizing Digital Security
- IBM Closes its $34 Billion Acquisition of Red Hat
- Interview with Security Expert and Author Ira Winkler
- What is Phishing Email? How to prevent Phishing email scams?
- Ways Our Business Email Exceed Your Expectations
- Spear Phishing Protection - Definition & How To Recognize Spear Phishing Email
- What is Whaling (Whaling Phishing)? & How to Prevent Whaling attacks?
- Business Email Compromise (BEC) - Definition & Prevention From BEC Attacks
- Wire Transfer Scams Involving Real Estate Transactions: How to Prevent Fraud with Effective Email Security
- Guardian Digital and Mautic: A Dynamic Open-Source Duo
- Email Malware - How to Recognize & Prevent Malware Email Attack
- An Open-Source Success Story: Apache SpamAssassin Celebrates 18 Years of Effectively Combating Spam Email
- What is Spam Email - Types & How to Prevent Spam Emails?
- 2020: A New Decade of Digital Threats - Is Your Business Email Secure?
- Linux: An OS Capable of Effectively Meeting the US Government’s Security Needs Heading into 2020
- Complete Guide on Email Security & Threats Faced by Organizations
- Email Virus - Complete Guide to Email Viruses Plus Best Practices
- What Are Zero-Day Attacks & How Can I Prevent Them?
- Guardian Digital Keeps its Customers Protected from Intel Design Flaw
- Security Spotlight: Open Source Email Security Solutions
- Top Six Advantages of Open Source Development/Products
- Python and Bash - Contenders for the most used scripting language
- Guardian Digital Outlines Top 4 Benefits of Choosing Cloud
- Unrivaled Protection Against Today’s Most Dangerous Threats
- Guard Your Email Accounts Against Today’s Most Dangerous Threats
- Security Highlights from Defcon 26
- Linux / Open Source FAQs: Common Myths / Misconceptions
- Email Security FAQs Answered by Guardian Digital
- Guardian Digital Mail Systems: Designed to be Secure Without Fail