Endpoint Security Experts: Fileless Attacks are on the Rise

Endpoint Security Experts: Fileless Attacks are on the Rise

Multiple reports from leading cybersecurity research firms and endpoint security solution providers sounded the warning alarm on fileless attacks. The summation of all of these reports can best be summarized as “fileless attacks are on the rise. Enterprises must take note.”

SentinelOne, an endpoint security vendor, recently released their Enterprise Risk Index Report for the first half of 2018. In this study, SentinelOne discovered that 70% of the executables previously unknown to reputation services were fileless attacks.

Carbon Black, another prominent endpoint protection platform provider, found fileless malware accounted for over 50% of successful data breaches on financial businesses.   

In a separate report, the distinguished Ponemon Institute learned fileless attacks made up 35% of all cyber-attacks in 2018. Furthermore, fileless attacks succeed 10 times more than regular file-based malware according to the research firm.

Information security nonprofit ISACA, in their “State of Cybersecurity 2018” report found ransomware attacks decreasing but being replaced by a rise in fileless attacks.

A fileless attack uses native endpoint processes such as PowerShell to run their malicious programming. Doing so negates the need to download a file and thus renders these attacks invisible to file-based or signature-based legacy antivirus solutions. In fact, it hides it exploitative programs in whitelisted processes.

To combat this wave of fileless attacks, the strongest tactics is to replace your enterprise’s legacy antivirus solution with a next-generation endpoint security solution with the capabilities to detect fileless malware (i.e. EDR). Indeed, legacy antivirus solutions are inadequately prepared to protect your enterprise from the modern digital threat landscape.  

Some experts recommend cutting off potential attack vectors by disabling the most common targets such as PowerShell. However, other experts argue against those drastic measures as it could result in serious productivity issues for your enterprise. For example, PowerShell is vital for critical business process automation.     

Other Resources: 

You Need to Hire More Female Cybersecurity Professionals

In Focus: The Desperate Shortage of Women in Cyber Security

Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What’s Changed?

4 Tips For Endpoint Security Solutions (That Everyone Forgets)

Comparing the Top Endpoint Security Vendors — Solutions Review

Answering the Top 4 Enterprise Endpoint Security Questions

What Can We Expect for the Future of Endpoint Security?

Six Endpoint Security Vendors to Watch in 2018

The 25 Best Endpoint Security Platforms and Tools of 2018

Ben Canner
Follow me

Ben Canner

Editor, Cybersecurity at Solutions Review
Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner
Follow me

Leave a Reply

Your email address will not be published. Required fields are marked *