We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
80,259 News Articles

Researchers find new type of "fileless" malware

Borrows worm design to act as a Trojan 'pathfinder'

Researchers have discovered an extremely rare and possibly unique form of "fileless" malware that executes entirely in memory without the need to save any files to the hard drive of a victim's PC.

The latest discovery was made by Kaspersky Lab, which received reports of a malware attack hitting a common Java vulnerability (CVE-2011-3544) on Russian websites, but without appearing to drop any files in order to instigate a conventional Trojan attack.

In fact the attack turned out to run Javascript from an iFrame embedded on an infected website, injecting its encrypted .dll payload directly into the Javaw.exe process.

The purpose of the unusual malware appears to be twofold; first to disable Windows User Account Control (UAC) and second to act as a 'pathfinder', setting up a bot to communicate with a command and control server from which it can receive instructions, including one to install the Lurk data-stealing Trojan on the infected PC.

The disadvantage of this attack is that the user can clear it from memory by restarting the machine in which case a new infection would be required. In return for this inconvenience, it is extremely hard to detect. No files are written and at first at least no files are changed on the target PC. If the exploit being targeted is unpatched then security programs will not pick it up easily.

The use of Java also makes it multi-platform, able to target PCs, Macs and Linux computers, although the Trojan that followed in the recorded attack was Windows-only.

Kaspersky reminds us that the new malware is reminiscent of the infamous Code Red and Slammer worms of a decade ago, but both of these were built simply to spread as far and fast as possible; since both attacked specific Microsoft programs using buffer overflows no files were needed.

The new attack is really more of an advance 'stub' that sets up an attack for a later point after exploiting its low profile to circumvent security systems. This counts as distinct and new.

"Based on our analysis of the protocol used by Lurk to communicate to the command servers, we determined that over a period of several months, these servers processed requests from up to 300,000 infected machines," said Kaspersky researcher, Sergey Golovanov.


IDG UK Sites

Microsoft Band UK release date and price rumours, features and specs: Microsoft smartwatch unveiled

IDG UK Sites

Why Sony's PS4 2.0 update is every gamer's dream (well, mine at least)

IDG UK Sites

This Grolsch ad combines stop-motion & CG for majestic results

IDG UK Sites

Apple rumours and predictions for 2015: What to expect from Apple in 2015