How can sans six-part methodology help with type of malware


Problem

One of the newer classes of attacks that is used against victims is called fileless malware. With fileless malware, malware is not stored in a file but is downloaded or uploaded dynamically into the system memory using tools built into the operating systems (such as PowerShell, Windows Management Instrumentation, .NET, and Office Macros). First, find an example of fileless malware and summarize how it works. Then describe how memory analysis and forensics may detect the malware when forensic analysis of the hard drive or non-volatile memory would show no signs of infection. How can the SANS six-part methodology help with this type of malware? Examples of fileless malware include:

1) Operation Cobalt Kitty
2) Ramnit Banking Trojan
3) Emotet
4) TrickBot
5) Ryuk
6) Fallout Exploit Kit
7) Shade Exploit Kit
8) Ursnif
9) Frodo
10) Number of the Beast
11) The Dark Avenger
12) Kovter
13) Powelike
14) SamSam.

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: How can sans six-part methodology help with type of malware
Reference No:- TGS03284549

Expected delivery within 24 Hours