Get a Pentest and security assessment of your IT network.

News

Fileless Infections from Exploit Kit: An Overview

The payload is injected directly into the process used for the exploitation (in our case iexplore.exe) as a new thread (instead of being a file dropped on disk) Memory-only attacks are easier to detect a piece of malware on disk than one hiding in memory. Traditional security solutions will detect the malicious payload on disk or perhaps in memory, after an exploitation has already happened. In the second part of this analysis, the attackers are hooking into an API that guarantees that the process survives when the user closes the application.”]

Source: https://blog.malwarebytes.com/threat-analysis/2014/09/fileless-infections-from-exploit-kit-an-overview/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

BlackEnergy exploits recently fixed flaws in Siemens WinCC

News

Google Chrome will block code injection from third-party software within 14 months