June 18, 2020
Whitepapers

When malware strikes and leaves no evidence

Download this asset as PDF file.
Download
When malware strikes and leaves no evidence

We’re all familiar with the term “malware”: malicious software that, for decades, has corrupted data and been stopped by anti-virus and anti-malware suites. As implied by its name, malicious software has a malicious executable file or DLL as the main host of their malicious functionality delivery. Malicious software has been studied by IT security companies for years. Researchers and developers are quite familiar with it and, at a certain point, cybercriminals understood that they had to invent or explore new attack vectors. That’s how fileless attacks with the “living-off-the-land” approach appeared. The concept has been around for decades and was heavily used on Unix attacks in the past, but it got new life recently on Windows systems.

As you would expect from a modern cybersecurity solution, Acronis Cyber Protect can detect and stop fileless malware with its multilayered approach to threat response.