Fileless Malware Evades Detection-Based Security (blog.morphisec.com)
from Joker@sh.itjust.works to cybersecurity@infosec.pub on 07 Dec 13:09
https://sh.itjust.works/post/29149322

#cybersecurity

threaded - newest

henfredemars@infosec.pub on 07 Dec 13:31 next collapse

This is a hard problem because fundamentally I understand that fileless malware is when an application is attacked and it causes unintended behavior. But how do we define unintended? How is a piece of software supposed to figure out that another is doing something it’s not designed to do? Heuristically, and that means things will fall through the cracks. There will always be problems when the attacker straddles the line between normal behavior of the application and doing malicious activity.

catloaf@lemm.ee on 07 Dec 17:02 collapse

And that’s why you should practice defense in depth, for example, by ensuring users do not have excessive privileges, or access to files they don’t need.

M33@lemmy.sdf.org on 07 Dec 13:42 next collapse

File less malware are my favorite. Users event turn back on you when you can’t even show them a malicious file that caused an alert, a wreckage, or just a few hours disrupting their favorite excel brain dead sheet

scytale@lemm.ee on 07 Dec 14:30 next collapse

Is this like prions for software?

henfredemars@infosec.pub on 07 Dec 15:14 collapse

Adept comparison! They are both difficult to destroy, and caused by misfolded or misappropriated software without actually putting new files or executables on the system. They are part of the system itself, integrated tightly into the existing software in memory.

Hiro8811@lemmy.world on 07 Dec 18:09 collapse

Cyberpunk distopia is coming to town baby