Concise Cyber

Subscribe below for free to get these delivered straight to your inbox

Advertisements
Report: Encrypted & Fileless Malware Dominate Modern Threat Landscape
Advertisements

Cybercriminals are increasingly adopting stealthier tactics, with a new report from WatchGuard Technologies revealing significant growth in encrypted and fileless malware. The analysis shows that threat actors are successfully evading traditional defenses by hiding their payloads within standard web traffic and using native system tools to carry out attacks.

Over 90% of Malware Hides in Encrypted Traffic

According to the second-quarter report, a staggering 91.5% of malware was delivered using HTTPS-encrypted connections. This trend makes detection significantly more difficult for organizations that do not perform HTTPS inspection at the network perimeter, effectively allowing nine out of ten threats to pass through unchecked. Two malware families, AMSI.Disable.A and XML.JSLoader, were responsible for the vast majority of these encrypted detections. The former is particularly evasive, using PowerShell commands to disable Windows’ Antimalware Scan Interface (AMSI) and execute malicious scripts without being flagged.

Fileless Attacks and Ransomware on the Rise

The use of PowerShell highlights another major trend: the surge in fileless malware. These “living off the land” (LotL) attacks leverage legitimate system tools to remain hidden in a computer’s memory, making them invisible to many antivirus solutions. In the first half of 2021 alone, script-initiated attacks reached 80% of the total volume for all of 2020, putting fileless threats on a trajectory to double year-over-year. Alongside this, ransomware has seen a dramatic resurgence. After a period of decline, ransomware attacks are on pace to increase by 150% in 2021 compared to the previous year, a finding supported by multiple security firms.

All articles are written here with the help of AI on the basis of openly available information which cannot be independently verified. We do strive to quote the relevant sources.The intent is only to summarise what is already reported in public forum in our own wordswith no intention to plagarise or copy other person’s work.The publisher has no intent to defame or cause offence to anyone, any person or any organisation at any moment.The publisher assumes no responsibility for any damage or loss caused by making decisions on the basis of whatever is published on cyberconcise.com.You’re advised to do your own checks and balances before making any decision, and owners and publishers at cyberconcise.com cannot be held accountable for its resulting ramifications.If you have any objections, concerns or point out anything factually incorrect, please reach out using the form on https://concisecyber.com/about/

Discover more from Concise Cyber

Subscribe now to keep reading and get access to the full archive.

Continue reading