{"id":7949,"date":"2017-02-09T12:00:32","date_gmt":"2017-02-09T17:00:32","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=7949"},"modified":"2017-02-09T06:47:21","modified_gmt":"2017-02-09T11:47:21","slug":"need-know-fileless-malware","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/need-know-fileless-malware\/","title":{"rendered":"What You Need to Know About Fileless Malware"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Fileless malware has been around for awhile now, but it gained in strength and numbers in 2016. Over the last several months especially, there has been a significant rise in fileless malware, and it is likely to attack more organizations now than ever before. That\u2019s why more fileless malware attacks are expected to occur in 2017. Ensure that your device is protected from various types of malware by running regular antivirus scans on your device. Click here to scan and remove malware from your device now:<\/span><\/p>\n<p><center><a href=\"psafe:\/\/launch\/antivirus_quick\" rel=\"attachment wp-att-7530\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-7530\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/02\/Security-Scan.png\" alt=\"Security Scan\" width=\"300\" height=\"78\" \/><\/a><\/center><b><br \/>\nWhat is Fileless Malware?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">As the name suggests, fileless malware infects a device without using files. Usually, with malware, malicious files are installed on a device. Fileless malware thus makes it more difficult for antivirus programs to locate and remove malware because no files are involved. There are multiple forms of fileless malware, but they all typically bury themselves deep within in a system\u2019s RAM to avoid detection. This type of malware is often used as spyware, ransomware, or to destroy a system.<\/span><\/p>\n<p><b>Read More:<\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/handling-malware-purports-antivirus-software\/\"> <b>Handling Malware that Purports to be Antivirus Software<\/b><\/a><\/p>\n<p><b>How Does Fileless Malware Work?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Currently, the most popular way to carry out a fileless malware attack is by using PowerShell and Windows Management Instrumentation (WMI) to infect a device or computer system with malware. Fileless malware can be a one-time attack, or else infect a system with multiple types of malware. Attacks also have a greater chance of infecting a computer or device if the device is rarely shut down.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For example, the 2016 hack of the Democratic National Convention involved fileless malware \u2014 specifically, hackers used PowerShell and WMI to gain access to the DNC\u2019s system. Another fileless malware attack weaponized Office documents in order to gain access to PowerShell and then infect a system. Because of the way fileless malware is distributed, it is very hard to detect on a system. This makes fileless malware an ideal type of malware, since it can typically remain undetected on a system for a longer period of time.<\/span><\/p>\n<p><b>How to Avoid Fileless Malware<\/b><\/p>\n<p><span style=\"font-weight: 400;\">One way to protect yourself from fileless malware is to stop it at the source. Make sure that your device\u2019s software and apps are up to date and run regular virus scans on your device to ensure that your data and your device is protected from malware.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consider this your guide to fileless malware. Learn what exactly it is, and how you can protect your data and personal information.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-7949","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=7949"}],"version-history":[{"count":0,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/7949\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=7949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=7949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=7949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}