Windows Event Logs Abused to Unleash Fileless Malware Attacks


A sophisticated assault effort that used a never-before-seen approach to plant fileless malware on targeted devices has been discovered. The campaign was discovered in February, and researchers believe the anonymous foes have been active for the past month.

The newly popular technique involves inserting shellcode directly into Windows event logs, according to researchers. As a result, attackers can utilise the Windows event logs as a shield to launch trojans at the end of the infection chain. Read More…