Logo Alt Text Logo Alt Text
  • About Us
  • Trust Center
  • Schedule a Demo
  • Resources & Blog
  • ID Theft Protection
    • IdentityForce.com
    • Breach Risk Intelligence
  • Mobile Security
    • Mobile Defense Suite
  • Identity Restoration
  • Breach Response
  • Small Business
    • Small Business Suite
  • Explore a Partnership
    • Tailored Programs
      • Resellers
      • Affiliate Marketing Program
    • Industries
      • Financial Institutions
      • Employee Benefits
      • Government Agencies
    • Continuous Support
    • Schedule a Demo

Hacked Without a Trace

The Threat of Fileless Malware

Posted on October 30, 2020 by in Breach & Scam Resources, Identity & Privacy, Personal, Scam Alerts

Finger pointing to malware virus

Understanding Fileless Attacks

Malware. The word alone makes us all cringe as we instantly relate it to something malicious happening on our computers or devices. Gone are the days when we thought the easiest way to protect our computers was to install the latest anti-everything. But today’s hackers no longer depend on victims downloading an infected file – they are now leveraging fileless malware.


Fileless attacks are a growing concern. In the first half of 2019, fileless attacks grew by 256 percent. In 2020, these attacks have become the most dangerous cybersecurity threat to endpoints.

Here’s an example of how financial institutions became susceptible. In 2017, ATMs around the world were found empty, with no trace of how all the money disappeared. By using fileless malware, hackers had actually gained remote control of the computers managing the ATM machines. They knew exactly how much money each machine held and through code embedded into bank computers, the ATMs were commanded to dispense money. Once the robbery was complete, the malware deleted itself without a trace. So, how did they do it?

Hackers Increasingly Leverage PowerShell and WMI to Attack

The latest in fileless malware leaves zero footprints as it runs on legitimate programs your computers trusts, most commonly PowerShell and Windows Management Instrumentation. What makes this attack different than viruses and trojans is that it loads directly into the memory of your CPU. This means that typical anti-malware and anti-virus software cannot detect it.

PowerShell

PowerShell is a tool in which users can automate tasks or manage configurations. Its capabilities allow you to simplify and automate tedious and repetitive tasks by creating scripts and combining multiple commands. PowerShell comes embedded in Windows’ programming but can be uninstalled. This tool is most often used by IT administrators, as it simplifies the management operations in large corporate networks.

Windows Management Instrumentation

Windows Management Instrumentation (WMI) permits administrators to gather metrics, install software, conduct updates and other tasks on the Windows operating system. Hackers can use this tool to silently run malicious code across multiple computers. Although WMI cannot be uninstalled, it can be manually disabled.

How Does an Attack Occur?

Fileless malware embeds itself into your natural web processes. It starts with clicking on a banner or a link that directs you to a webpage that requires Adobe Flash. Unfortunately, the Flash that loads is riddled with vulnerabilities that power up PowerShell or WMI and begin working behind the scenes to infiltrate your system.

What Damage is Done?

Over 68 percent of successful breaches are attributed to fileless malware attacks. If the malware gains access to PowerShell or WMI, it can move laterally across devices connected to your organization’s network. The malware is capable of exploiting applications such as Microsoft Office files and web browsers, collecting information and hindering device performance in the process.

Malware attacks also cause financial damage. Hackers pilfer corporate information through fileless malware and later requested a ransom in return for the data. The average ransom payment was $18,000.

Since this cyberattack is difficult to detect, you might be wondering how do I protect myself?

3 Tips to Protect Against Fileless Malware

  1. Avoid clicking on suspicious links or attachments. Visiting an unknown website or opening an unfamiliar file can be a gateway for fileless malware.
  2. Disable PowerShell and WMI. If you’re not using them, deactivating these tools lessens the opportunity for hackers to access your information with a fileless attack.
  3. Keep your software up to date. As inconvenient as they can be, software updates are usually done to patch critical security vulnerabilities.

Meet the Author

John is General Counsel and Chief Privacy Officer of Sontiq, the parent company of the EZShield and IdentityForce brands. He is a Certified Compliance and Ethics Professional through the SCCE and has broad experience in an extensive variety of compliance and regulatory areas, including the FTC Act, UDAAP, Sarbanes-Oxley, GLB, Dodd-Frank, PCI Compliance, FCRA and state level regimes. John has experience as in-house counsel for both private and public companies, providing him with a strong foundation in understanding the needs of business owners of all sizes, as well as the individual consumers who ultimately use and benefit from Sontiq’s intelligent identity security solutions.


Related Insights

What is Ransomware? How to Protect Yourself and Your Business

What is ransomware? Ransomware is a form of malware, or malicious software, used to encrypt…

See more


6 Tips to Stay Safe and Connected During the Holidays

Celebrating with friends and family during the holidays may mean more digital connections and online…

See more


10 Ways to Avoid Online Holiday Scams

Identity thieves know the holidays are the perfect time for catching people when they’re most…

See more

Sontiq
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
  • ID Theft Protection
  • Mobile Security
  • Identity Restoration
  • Breach Response
  • Small Business
  • Explore a Partnership
  • About Us
  • Trust Center
  • Press Room
  • Contact
  • Terms of Use
  • Privacy Policy
  • EU-US Privacy Shield Privacy Policy
  • EU GDPR Fair Processing Notice
  • Do Not Sell My Information

© 2021 Sontiq. All rights reserved.

Questions?
Call 1-888-6-SONTIQ
Send Us An Email
Live Chat