Fileless malware is a type of a malicious code execution technique that operates completely within process memory; no files are dropped onto the disk. Without any artifacts on the hard drive to detect, these attacks easily evade current detection solutions. Also known as in-memory or non-malware attacks, fileless techniques are part of almost any cybercrime groups’ arsenal and present one of the most dangerous threats to organizations in every industry.

The 2018 State of Endpoint Security Risk study by Ponemon found that 76% of successful breaches involved fileless techniques.

In the report “Fileless Malware: Attack Trend Exposed,” we trace the evolution of this trending attack vector, as marked by exponential growth in both fully fileless attacks and commodity malware adopting fileless tactics. It looks at different fileless techniques and examines how various malware incorporates these techniques to avoid being detected.