Fileless attacks make use of in-built applications in a system. It allows cybercriminals to inject code into memory level (RAM) making these attacks difficult to detect. 

Infographics - Fileless Attack
Download Infographic

Download and share the infographic for free with employees.

How does it work?

  1. User receives a phishing email with a link to malicious website
  2. User visits the website installing exploit
  3. Exploit scans the user’s system for vulnerabilities
  4. If found, exploit starts running payload in the memory
  5. Attacker gain access to data leading to other malicious activities

We recommend the following

  1. Keep your Operating System, web browsers, applications, software up to date.
  2. Install security software that provides multilayered protection.
  3. Avoid opening links or attachments from untrusted sources.
  4. Uninstall or turn off unnecessary software applications, features or add-ons.