State-sponsored actors in Asia have been leveraging fileless RAT for their hacking campaigns in order to avoid detection by security solutions. The state-sponsored hackers were injecting the RAT payload directly into the memory of the target host. The researchers are warning about the possibility that other threat actors across the world can exploit the same technique in their hacking campaign. The RAT is called NanoCore (aka Nancrat) and is based on a fileless Remote Access Trojan. The technique is widely adopted by several Asian countries.”]
Source: https://securityaffairs.co/wordpress/46557/malware/fileless-rat.html

