VB2016 paper: One-Click Fileless Infection

Posted by   Martijn Grooten on   Mar 28, 2017

Over the last few years, we have seen a sharp increase in 'fileless' infections, where a machine is compromised without a malicious file ever being written to disk. Though not impossible to detect and prevent, they do require a security product.

In a paper entitled "One-click fileless infection" presented at VB2016 in Denver, Symantec researchers Himanshu Anand and Chastine Menrige discuss fileless malware infections in general and one kind in particular, where it meets one-click fraud to become one-click fileless infection: an infection where a single click is enough for a device to become infected, and no malicious file is written to disk.

Today, we publish their paper in both HTML and PDF format. We have also uploaded the video of their presentation to our YouTube channel.

fileless-fig4.jpg

The programme for VB2017, which will take place 4-6 October in Madrid, Spain, will be published next month. Registration for the conference will also open in April.

twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

The road to IPv6 is generally smooth but contains a few potholes

Most of the switch from IPv4 to IPv6 will happen seamlessly. But we cannot assume it won't introduce new security issues.

New paper: Powering the distribution of Tesla stealer with PowerShell and VBA macros

Since their return four years ago, Office macros have been one of the most common ways to spread malware. Today, we publish a research paper which looks in detail at a campaign in which VBA macros are used to execute PowerShell code, which in turn…

VB2017 paper: Android reverse engineering tools: not the usual suspects

Within a few years, Android malware has grown from a relatively small threat to a huge problem involving more than three million new malware samples a year. Axelle Apvrille, one of the world's leading Android malware researchers, will deliver a…

Patch early, patch often, but don't blindly trust every 'patch'

Compromised websites are being used to serve fake Flash Player uploads that come with a malicious payload.

Virus Bulletin at RSA

Next week, VB Editor Martijn Grooten will be at the RSA Conference in San Francisco.