Invisible Malware

A new type of attack called "Invisible Malware" has been discovered by researchers at Kaspersky Lab. This new attack avoids detection by using legitimate software such as penetration-testing and administrative tools along with the PowerShell framework for Window's task automation. The key to these attacks is that no malware files get physically put on the targeted machine and instead, stays in the memory until the system reboots. This could pose to be a very big problem in 2017 as over a 140 enterprise networks have been hit around the globe.

This combined approach helps to avoid being detected by whitelisting technologies, and leaves forensic investigators with almost no artifacts or malware samples to work with. The attackers stay around just long enough to gather information before their traces are wiped from the system on the first reboot.

Source: BetaNews