Cybercrime , Fraud Management & Cybercrime

Cybercrime Trends: Cryptojacking, Fileless Attacks

Carbon Black's Rick McElroy Describes Latest Attacks and Threat Hunting Tactics
Rick McElroy, security strategist, Carbon Black

Attackers continue to shift their tactics to help evade improvements in defenses, says Rick McElroy of Carbon Black.

See Also: NHS Ransomware Attack: Healthcare Industry Infrastructures Are Critical

"Traditionally, a lot of endpoint attacks were malware-based," for example to infect systems with ransomware, he says. "Now, what attackers have started to do is, they know that there's better detection down there, and better prevention for that. So they're starting to do things like memory injections and invoking things like PowerShell, or invoking WMI [Windows Management Instrumentation]. So they continue to evolve and to evade traditional technology that's out there."

In a video interview at the recent Infosecurity Europe conference in London, McElroy discusses:

  • Malware: Executable versus fileless attacks;
  • Attackers' shift from using PowerShell to WMI;
  • How ransomware is giving way to cryptojacking.

McElroy, security strategist for Carbon Black, has more than 15 years of information security experience educating and advising organizations on reducing their risk posture and tackling tough security challenges. He has held security positions with the U.S. Department of Defense and in several industries, including retail, insurance, entertainment, cloud computing and higher education.

About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.