The anatomy of a completely fileless attack

August 4, 2017


The use of fileless malware is definitely on the rise, and it’s used both by targeted threat actors and cybercriminals.

Trend Micro researchers, though, are keen to explain that there are malware that are fileless only while entering a user’s system (and they eventually reveal themselves when they execute their payload), and there are completely fileless malware attacks, where the entire infection chain is fileless.

One example of the latter starts with a downloader Trojan they dubbed JS_POWMET.

Read More on Help Net Security