Overview

  1. This section contains our analysis of malicious files that were found in both the hard disk and memory (RAM) of the infected system.
  2. During our initial analysis, we have identified an attack type known as 'Fileless Malware' wherein a hacker turns the victim's operating system against itself without the need for installing additional software. This type of attack became popular during late 2014 with the emergence of malware families WMIGhost and Poweliks. These malware threats are difficult to detect and clean due to their use of unconventional locations for hiding their payloads. This is one of the main reasons why the malware in this case remained undetected for a year.
  3. Initial findings (JDSODM23 / EMM string) led us to believe ...

Get Learn Social Engineering now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.