Fileless attacks: compromising targets without malware

2017; Elsevier BV; Volume: 2017; Issue: 4 Linguagem: Inglês

10.1016/s1353-4858(17)30037-5

ISSN

1872-9371

Autores

Steve Mansfield-Devine,

Tópico(s)

Information and Cyber Security

Resumo

When a computer is compromised, one of the first things a security or forensic specialist will look for is software that shouldn't be there. Many forms of attack involve malicious software, sometimes created specifically for that target. But as Mike Viscuso, co-founder and CTO at Carbon Black, explains in this interview, attackers are increasingly turning to the legitimate software that's already on the machine as a way of achieving their ends. When a computer is compromised, one of the first things a security specialist will look for is software that shouldn't be there. Many forms of attack involve malicious software, sometimes created specifically for that target. But as Mike Viscuso of Carbon Black explains in this interview, attackers are increasingly turning to the legitimate software that's already on the machine – such as PowerShell – as a way of achieving their ends. And traditional defences are poor at spotting non-malware attacks. That's why some organisations are turning to streaming prevention to protect their endpoints.

Referência(s)
Altmetric
PlumX