Operation Sharpshooter Uses Fileless Malware to Attack Global Infrastructure

Operation Sharpshooter Uses Fileless Malware to Attack Global Infrastructure

Actor uses recruiting lure for collection and exfiltration

Fileless Malware to Take Centerstage Role in Future Threat Landscape Says Report

Fileless Malware to Take Centerstage Role in Future Threat Landscape Says Report

This type of attack is ten times more likely to succeed

Banks Compromised Using GPRS/3G/LTE Capable Devices Implanted on Local Networks

Banks Compromised Using GPRS/3G/LTE Capable Devices Implanted on Local Networks

Attackers stole tens of millions via mobile connections

Fileless Backdoored Trojan Spreads Using Worm Living in Removable Drives

Fileless Backdoored Trojan Spreads Using Worm Living in Removable Drives

The Trojan comes with key logging and DDoSing capabilities

Holiday Suppliers Already Under Assault by Fileless Malware Campaign

Holiday Suppliers Already Under Assault by Fileless Malware Campaign

Attackers use the NetwiredRC backdoor to compromise victims

Fileless Malware Attack on Russian Banks Helps Hackers Steal $800K

Fileless Malware Attack on Russian Banks Helps Hackers Steal $800K

ATMs were handing out the money in large stacks

Recent Wave of Malware Uses Macro-Enabled Word Documents and Windows PowerShell

Recent Wave of Malware Uses Macro-Enabled Word Documents and Windows PowerShell

Spam campaign delivers fileless malware to its victims

  • Security
  • By Catalin Cimpanu
  • December 15th, 2015
The Return of Macro Malware and Other Malware Trends

The Return of Macro Malware and Other Malware Trends

Fileless malware evolves, is now harder to detect

Fileless Malware Makes Almost 200,000 Victims, Mostly in the US

Fileless Malware Makes Almost 200,000 Victims, Mostly in the US

Windows zero-day exploited for privilege escalation

Fileless Threat “Phasebot” Encrypts Communication with Server

Fileless Threat “Phasebot” Encrypts Communication with Server

Uses PowerShell to execute malicious shellcode

Fileless Poweliks Malware Distributed Through Spam and Exploit Kits

Fileless Poweliks Malware Distributed Through Spam and Exploit Kits

Although different, malware uses regular distribution method