Call a Specialist Today! (02) 9388 1741
Free Delivery! Free Delivery!

The Latest WatchGuard News
Product and Solution Information, Press Releases, Announcements

Understanding Fileless Malware Outside the Network
Posted: Thu Jan 07, 2021 01:42:01 PM
 

Fileless malware has been making headlines over the past year, taking center stage as one of todays most prominent threat categories. According to Cisco, fileless attacks were the most common threat targeting endpoints in the first half of 2020. To prevent this type of malware effectively, organizations need to establish a deep understanding of how it works in practice.

Senior Security Analyst Marc Lalibertes latest Help Net Security article does just that. A follow up to WatchGuards recent Anatomy of an Endpoint Attack column, the piece covers fileless malware basics and explores a real-world infection WatchGuards Threat Lab stopped in its tracks. Heres a brief excerpt:

Although the majority of fileless malware starts with some form of dropper file, more evasive variants exist that truly dont require a file. These instances generally originate in one of two ways, either A) by exploiting a code execution vulnerability in an application or B) (and more commonly) by using stolen credentials to abuse a network-connected applications capabilities to run system commands.

WatchGuard Threat Lab recently identified an ongoing infection that used the latter technique. We investigated an alert generated through the Panda AD360 threat hunting console and pieced together indicators and telemetry from a server endpoint in the would-be-victims environment to identify and remediate the threat before it accomplished its goal.

This particular infection had an uncommon entry point: the victims Microsoft SQL Server. While SQL Servers primary role is to store data records, it also includes procedures capable of executing system commands on the underlying server. And while Microsofts best practices advise using service accounts with limited privileges, many administrators still deploy SQL Server with elevated system-level accounts, giving the database application and any command it runs free reign over the server.

Before starting the attack, the threat actor obtained credentials for accessing the SQL Server. While were not certain how they acquired them, its likely to have been through a spear-phishing email or by simply brute-forcing their way in by attacking weak credentials. Once they had access to executing SQL commands, the attackers had a few potential options for launching commands on the underlying system.

Read the full article here for an in-depth look at fileless malware beyond the network and best practices for preventing these attacks.

 
« Return to News List