Get a Pentest and security assessment of your IT network.

News

Fileless Infections from Exploit Kit: An Overview

The payload is injected directly into the process used for the exploitation (in our case iexplore.exe) as a new thread (instead of being a file dropped on disk) Memory-only attacks are easier to detect a piece of malware on disk than one hiding in memory. Traditional security solutions will detect the malicious payload on disk or perhaps in memory, after an exploitation has already happened. In the second part of this analysis, the attackers are hooking into an API that guarantees that the process survives when the user closes the application.”]

Source: https://blog.malwarebytes.com/threat-analysis/2014/09/fileless-infections-from-exploit-kit-an-overview/

Related posts
News

Ashley Madison 2.0 Hackers Leak 20GB Data Dump, Including CEO's Emails

News

Art of Twitter account hacking

News

SEA has stolen invoices that shows Microsoft charges FBI for user data

News

Greek police arrested a man running the BTC-e Bitcoin exchange to launder more than US$4bn worth of the Bitcoin