The Dangerous Combo: Fileless Malware and Cryptojacking

03/07/2022
by   Said Varlioglu, et al.
0

Fileless malware and cryptojacking attacks have appeared independently as the new alarming threats in 2017. After 2020, fileless attacks have been devastating for victim organizations with low-observable characteristics. Also, the amount of unauthorized cryptocurrency mining has increased after 2019. Adversaries have started to merge these two different cyberattacks to gain more invisibility and profit under "Fileless Cryptojacking." This paper aims to provide a literature review in academic papers and industry reports for this new threat. Additionally, we present a new threat hunting-oriented DFIR approach with the best practices derived from field experience as well as the literature. Last, this paper reviews the fundamentals of the fileless threat that can also help ransomware researchers examine similar patterns.

READ FULL TEXT
research
05/23/2020

Devising Malware Characterstics using Transformers

With the increasing number of cybersecurity threats, it becomes more dif...
research
06/30/2021

The Threat of Offensive AI to Organizations

AI has provided us with the ability to automate tasks, extract informati...
research
09/03/2021

Ontology-driven Knowledge Graph for Android Malware

We present MalONT2.0 – an ontology for malware threat intelligence <cit....
research
07/06/2019

Intelligent Systems Design for Malware Classification Under Adversarial Conditions

The use of machine learning and intelligent systems has become an establ...
research
09/26/2022

Characteristics and Main Threats about Multi-Factor Authentication: A Survey

This work reports that the Systematic Literature Review process is respo...
research
10/01/2020

Biocybersecurity – A Converging Threat as an Auxiliary to War

Biodefense is the discipline of ensuring biosecurity with respect to sel...
research
11/25/2018

Automated Dataset Generation System for Collaborative Research of Cyber Threat Intelligence Analysis

The objectives of cyber attacks are becoming sophisticated and the attac...

Please sign up or login with your details

Forgot password? Click here to reset