Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

8/28/2018
05:00 PM
Connect Directly
Twitter
LinkedIn
RSS
E-Mail
50%
50%

Fileless Attacks Jump 94% in First Half of 2018

While ransomware is still popular, fileless and PowerShell attacks are the threats to watch this year.

A snapshot of the threat landscape from the first half of 2018 shows fileless and PowerShell attacks are the ones to worry about this year, security analysts report.

Endpoint security firm SentinelOne today published its "H1 2018 Enterprise Risk Index Report," which shows fileless-based attacks rose by 94% between January and June. PowerShell attacks spiked from 2.5 attacks per 1,000 endpoints in May 2018 to 5.2 attacks per 1,000 endpoints in June. Ransomware remains popular, ranging from 5.6 to 14.4 attacks per 1,000 endpoints.

The rise of fileless and PowerShell attacks wasn't a major surprise to Aviram Shmueli, SentinelOne's director of product management and leader of this report, who says the two are especially appealing to threat actors who want to fly under their targets' radar.

"Fileless attacks are more sophisticated; they don't leave any trace," he explains, adding that these types of threats are increasingly common in user data. The PowerShell spike "tells us PowerShell [attacks] are here to stay," Shmueli says. Fileless, lateral movement, and document attacks made up 20% of all attacks analyzed in the report.

Fileless and PowerShell attacks are powerful, and attackers can leverage either to do significant damage, he says. It's worth noting the two can overlap: PowerShell lets actors access internal components and can be fileless in nature, enabling them to evade detection.

This report isn't the only one pointing to the popularity of PowerShell among cyberattackers. Earlier this year, McAfee published findings indicating a 267% spike in fileless malware samples spreading PowerShell in the fourth quarter of 2017 alone, compared with the same time period one year prior.

When it comes to which threat is easier to execute, Shmueli says PowerShell might be the more accessible option. "PowerShell is already installed on Windows systems, so attackers can rely on the fact that it's already there without installing anything else," he adds. "This is why we believe attackers choose to use this vector so frequently."

However, the simultaneous increase in fileless attacks indicates threat actors are becoming more sophisticated and turning toward advanced forms of cybercrime. It's becoming less difficult for them to create payloads that won't get caught, complicating defense for targets.

Researchers investigated the drivers behind the recent spikes in fileless and PowerShell attacks but couldn't point to a specific reason driving the increase. This seems to be more of an overall growing trend than a spike related to a particular campaign.

While all three threat vectors are popular, Shmueli says companies should be most cautious about fileless campaigns. The 2018 spike was preceded by an incremental rise in fileless malware that is likely to continue.

"I believe that we will see a growing number of fileless attacks and PowerShell attacks," he adds. As for ransomware, he's not so sure. "The trend is not so constant," he admits. SentinelOne will continue to release these types of reports on a quarterly basis.

Related Content:

 

Black Hat Europe returns to London Dec 3-6 2018  with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-27132
PUBLISHED: 2021-02-27
SerComm AG Combo VD625 AGSOT_2.1.0 devices allow CRLF injection (for HTTP header injection) in the download function via the Content-Disposition header.
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...