Get Started Today!  217-475-0226

croom new

Decatur Computers Inc. Blog

Fileless Malware Attacks Increasing

Fileless Malware Attacks Increasing

Ransomware has been far from low-profile since its inception several years ago. Everyone knows what the file-encrypting malware does, and they all know that paying the ransom can make the nightmare go away by decrypting the files located on their computer. As if the threat of losing data forever wasn’t enough, you’re staring down a ticking clock while this is going on. Nowadays, ransomware is becoming more difficult to manage through various tactics.

Businesses are forced to invest in IT security to prevent themselves from making the next headline regarding cybersecurity (or lack thereof). Unfortunately, even the best and most comprehensive security solutions can't help you if the file is already on your computer or network. If the malware has gone wireless, there’s a very real possibility that this can happen. We’ll help you understand the concept of fileless ransomware, and why it’s not a good thing for users and organizations.

The reason why hackers are so intent on making their malware fileless is because security professionals and organizations have really stepped up their game in recent years to fend off these infections. 99.9 percent of all would-be malware attacks were actually turned away outright in 2017, emboldening users and convincing hackers that they need to take new measures to get victims. Thus, the arms race continues with the development of new types of ransomware.

Ransomware has represented a shift in the way that businesses look at the dangers of the Internet. Fileless malware takes this a step further by attacking the default Windows tools (Powershell and Windows Management Instrumentation) to support malicious activity. Since these tools are on every Windows machine, these types of attacks are effective at hitting a lot of users where it hurts.

How it Works
Fileless ransomware is generally dispersed in the same way as traditional malware--through phishing emails and messages. This is why it’s so important for your business to train employees on how to identify suspicious messages. However, rather than using email attachments or downloading malware onto the system directly, fileless ransomware will instead run a macro in the RAM of a machine to create a command line and run the application. In this situation, the program doing the encrypting is actually PowerShell or WMI (talk about a stab in the back). A message is then shown indicating that the files have been encrypted and are being held until payment is received. Once this happens, the user is given a short amount of time to make a decision regarding the fate of their files.

We at Decatur Computers Inc. know the frustrations and challenges associated with network security, and you can bet that we know a thing or two about how to keep ransomware off a network. To learn more about how we can help your organization keep itself safe, reach out to us at 217-475-0226.

Enhancements Made to Google Maps
This Week’s Tech Term: Responsive Web Design


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, February 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Best Practices Technology Network Security Business Computing Privacy Tech Term Hackers Productivity Data Backup Data Software IT Support Efficiency Innovation Android Malware User Tips Data Recovery Google Business Management Cybersecurity Internet Email Collaboration Communications Computer Smartphone Windows 10 Cloud Small Business IT Services Backup Communication Ransomware Phishing Mobile Device Hosted Solutions Managed IT Services Social Media Business Technology Hardware BDR Browser VoIp Facebook Artificial Intelligence Microsoft Office Mobile Devices Information App Access Control Office 365 Outsourced IT Mobile Device Management Cloud Computing Automation Cybercrime Managed Service Cost Management Applications IT Management Blockchain Business Workplace Tips Two-factor Authentication Microsoft Passwords Holiday Patch Management Apps Data Security Encryption Scam Websites Server Gadgets Network Smartphones Hard Drive Maintenance Data Management Managed IT Services Update Saving Money Disaster Recovery Antivirus Vendor Project Management Money Search Spam Internet of Things Big Data Word Save Money Digital Managed Service Provider Data Protection Alert Conferencing Touchscreen Document Management Data loss Google Maps Windows Hacking Apple Quick Tips Law Enforcement Start Menu Cooperation Saving Time Laptop VPN Vulnerability Vulnerabilities Data Breach Bitcoin Augmented Reality Operating System Mobility Analytics Social Engineering Bandwidth Healthcare Users SaaS Tech Terms Business Continuity Remote Monitoring Printer Gmail Professional Services Comparison Accountants Uninterrupted Power Supply Google Drive Microchip Computer Care Excel Company Culture Google Calendar HTML Trends Cleaning Virus Social Network Modem Paperless Office Worker Network Management Help Desk SharePoint Business Cards Virtualization Unified Threat Management Monitoring Term Legal Sports Specifications eWaste Training Telephony Travel Processor Tip of the week Identity Theft Outlook Voice over Internet Protocol Samsung Virtual Assistant Vendor Mangement Gamification Entertainment Microsoft Excel Upgrades Information Technology Computers YouTube Customer Resource management SSID Multi-factor Authentication Database Service Level Agreement Vendor Management Disaster Distributed Denial of Service Unified Threat Management Management Google Play Downloads Access Emergency Television Robot Equifax History VoIP Username Navigation Desktop Chromebook Google Docs iPhone Devices Business Mangement Data Analysis Cryptocurrency Mobile Technology Nanotechnology Settings Telephone System Device security Tactics Going Green Freedom of Information Downtime Emails Computing Security Cameras Running Cable Spyware User Tip Mouse WiFi Startup IBM Evernote Unified Communications Cortana Automobile Backup and Disaster Recovery Electronic Medical Records Medical IT Redundancy Budget Hard Drive Disposal Compliance Solid State Drive Content Fileless Malware Audit Telephone Systems Administration IT Support Website Download Bookmark Knowledge News Best Practice Piracy Bluetooth Tablet Software as a Service Error Social Cabling Addiction DDoS Wireless Computing Infrastructure Corporate Profile Time Management Miscellaneous Printing Twitter Health IT PowerPoint email scam Regulations BYOD Directions Consultant Virtual Reality Screen Reader Employer-Employee Relationship Password Upload Browsers Fake News Unsupported Software Software License Wireless Headphones How to Telephone Router Managed IT Mobile Security Machine Learning Proxy Server Networking Legislation Tech Government Managing Stress Windows 10 Marketing Retail Multi-Factor Security Office Printers CrashOverride Office Tips Regulation

Latest Blog

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, ...

Latest News

Decatur Computers Inc. is proud to announce the launch of our new website at The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.