Optiv Cybersecurity Dictionary

What are Fileless Attacks?

Fileless attacks inject malicious code into RAM memory and exploit approved applications on targeted devices to achieve their objectives and thwart detection.

 

With traditional file-based malware, the attacker must write a file to the local drive of the targeted device, which is an action that's more easily detected by modern security controls. By contrast, fileless attacks inject malicious code only into RAM memory (hence fileless) and exploit approved applications on targeted devices. This makes them far more difficult to detect. Fileless attacks commonly exploit administrative utilities such as Windows Powershell or Windows Management Instrumentation (WMI). 


Contact Us



Would you like to speak to an advisor?

How can we help you today?

Image
field-guide-cloud-list-image@2x.jpg
Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation
Image
OptivCon
Register for an Upcoming OptivCon

Ready to speak to an Optiv expert to discuss your security needs?