henfredemars@infosec.pub
on 07 Dec 13:31
nextcollapse
This is a hard problem because fundamentally I understand that fileless malware is when an application is attacked and it causes unintended behavior. But how do we define unintended? How is a piece of software supposed to figure out that another is doing something it’s not designed to do? Heuristically, and that means things will fall through the cracks. There will always be problems when the attacker straddles the line between normal behavior of the application and doing malicious activity.
And that’s why you should practice defense in depth, for example, by ensuring users do not have excessive privileges, or access to files they don’t need.
File less malware are my favorite. Users event turn back on you when you can’t even show them a malicious file that caused an alert, a wreckage, or just a few hours disrupting their favorite excel brain dead sheet
Adept comparison! They are both difficult to destroy, and caused by misfolded or misappropriated software without actually putting new files or executables on the system. They are part of the system itself, integrated tightly into the existing software in memory.
threaded - newest
This is a hard problem because fundamentally I understand that fileless malware is when an application is attacked and it causes unintended behavior. But how do we define unintended? How is a piece of software supposed to figure out that another is doing something it’s not designed to do? Heuristically, and that means things will fall through the cracks. There will always be problems when the attacker straddles the line between normal behavior of the application and doing malicious activity.
And that’s why you should practice defense in depth, for example, by ensuring users do not have excessive privileges, or access to files they don’t need.
File less malware are my favorite. Users event turn back on you when you can’t even show them a malicious file that caused an alert, a wreckage, or just a few hours disrupting their favorite excel brain dead sheet
Is this like prions for software?
Adept comparison! They are both difficult to destroy, and caused by misfolded or misappropriated software without actually putting new files or executables on the system. They are part of the system itself, integrated tightly into the existing software in memory.
Cyberpunk distopia is coming to town baby