AST Digital Magazine July/August 2016 - Page 78

Volume 6 ploits. Weaponized documents hijack trusted applications such as Microsoft Word or Adobe Acrobat Reader and transform them into malware. File-less malware abuses built-in Windows utilities to create an attack. Another form of file-less malware forms in memory and has no file footprint in the system. Espionage based file-less malware easily scrapes information from a CFO’s laptop or steals Windows login credentials from any desktop. The adversaries use these stolen credent 2FvVfWGFW&V@66W72FVFW'&6R&W6W&6W2VFWFV7FV@vvFgW'FW"WFVF6FwV&B&FV7G2VFW'&6W2g&FW&v&RvRFW"6766FVfV6W27V62Ff'W26VFr6RV&rWrvVW&FFf'W2vFRƗ7FrFWBBVG@FWFV7FB&W76RTE"fF7FFW6P'&V6W2ࠤVǒVr#bVFFwV&BffW'2VffV7FfRFVfV6Rv7BgVW&&ƗFW2BFG&W76VB'6fVFV2vFWB&VǖrFWFV7FFVFf6F6vGW&W2"66rwV&BF7'WG2v&PGF62Fr'&V6GFVG2&Vf&R6&֗6R667W"wV&B7F2W&Fv&Rǖ'0v&R6r( fW'F6~( vFW&rֆR&Vf&RVF&6VBv&RFFVBF7VVBG'W62v2vV旦VBv&RG&fR'FvG2B&6v&RࠥFV6v6fFࠤwV&B2&RW6VBFFVFgWrv&PF&VBFF6V7FVBBfbVFW'&6R&VBFPv&RV"&VFPwV&B2FRǒ&WfVFfRFV6wF@7F2FW&v&RBFRV&ƖW7B7FvW2bFPGF6BvVW&FW22F6F'2bGF6vFWB7GVǒFWFFrFRv&RvFW@66rvFWB&VƖ6R6vGW&W26VFpFRvGF66vGW&W2v272F6F'2b6&֗6RFW"VGB&FV7F&GV7G2rv&RF( FWFF^( &VǖrFWFV7FrB&W7FrFFR6&֗6RFPFƖ֗B'&V6VffV7G2'&V6W2vFWBv6vGW&R"26vVFWFV7FVBf"vVV2 F26rVFW'&6RB&6bFW&Vǒ'&V6FWFV7FvFRƗ7Fr&6Ɨ7FrFf'W26F&r"FW"FWFV7F&6VBFV6VW2ࠤB&FV7G2V"Ɩ6F2֖7&6gBff6Rff6R3cRDn( 2FW&WBW&W"6&Rf&VfWF2Bf'GVFW6FFW&f6RdDFf&2VƖR6F&&6VB6FVB&GV7G2wV&BFW2BVVBF&RWFFVB&W76PFƖ6FF&r"Ɩ6F"W&Fp77FVWFFW2wV&B7W'G2FVw&FbV&VFFVB&G0bG'W7B7V62G'W7FVBFf&GVREҒ@Bv&2vF֖7&6gBFWf6TwV&B2vV2vFw2f'GV6V7W&RFRe4ҒwV&B0W'f6"v7F26'VGRW'f6"7W'FVBFf&B7W'G2֖7&6gN( 0W"bBW6֖rvFw2W&R6VFV@f'GV6W2vFf'GVE2FR֖7&6g@W&R6VBBFW2BF7'WBFRW6W"WW&V6RvFVvFFRVGBW&F2&6V@FVBG2VFW&ǖrFV6w2FF&PFFW"FW&W&Fr77FV26'GW2s