Fileless malware
obere ụdị nkemalware Dezie

Fileless malware bụ ụdị nke kọmputa metụtara ngwanrọ ọjọọ nke dị naanị dị ka ihe nchekwa kọmputa nke dabeere na RAM.

Ọ naghị ede akụkụ ọ bụla nke ọrụ ya na diski ike nke kọmputa nke pụtara na ọ na-eguzogide usoro nyocha nke Anti-computer dị ugbu a nke na-agụnye ndepụta ọcha dabeere na faịlụ, nchọpụta mbinye aka, nkwenye ngwaike, nyocha ụkpụrụ, akara oge, wdg, ma na-ahapụ obere ihe site na ihe akaebe nke ndị nyocha nyocha dijitalụ nwere ike iji chọpụta ọrụ na-akwadoghị.

Dị ka e mere malware nke ụdị a iji rụọ ọrụ na ncheta, ogologo ndụ ya na usoro ahụ dị naanị ruo mgbe a maliteghachiri usoro ahụ.

Nkọwa

dezie

A na-ewere malware na-enweghị ntụpọ mgbe ụfọdụ dị ka ihe jikọrọ ya na malware na-echeta ka ha abụọ na-arụ ọrụ ha n'edeghị data na diski n'oge ndụ nke ọrụ ha. Nke a emeela ka ụfọdụ ndị na-ekwu okwu kwuo na ụdị a dị iche iche abụghị ihe ọhụrụ ma bụrụ naanị "nkọwa nke okwu a maara nke ọma, nje bi na ebe nchekwa, nke a pụrụ ịchọta usoro ọmụmụ ya na 1980s na ọmụmụ Lehigh Virus nke onye malitere okwu ahụ, Fred Cohen, mepụtara, wee nwee mmetụta na akwụkwọ ya na isiokwu ahụ.[1][2]

Akụkọ ihe mere eme

dezie

Fileless malware bụ ụdị evolushọn nke ngwanrọ ọjọọ nke weere ihe nlereanya na-adịgide adịgide nke imeziwanye onwe onye / nkwalite na ịkwọ ụgbọala gaa n'ọnọdụ mwakpo a kọwara nke ọma, nke a pụrụ ịchọta mgbọrọgwụ ya na mmemme nje virus nke nkwụsị-na-anọ / ebe nchekwa nke, ozugbo ha malitere, ga-ebi na ebe nchekwa na-echere nkwụsị usoro tupu ha enweta ohere ịnweta njikwa ha; ihe atụ nke a hụrụ na nje ndị dị ka Frodo, The Dark Avenger, Number of the Beast .[3][4]

Mmepe na nso nso a

dezie

Na Febụwarị 8, 2017, Kaspersky Lab's Global Research & Analysis Team bipụtara akụkọ akpọrọ: "Fileless attacks against enterprise networks" nke na-emetụta ụdị malware a, na ọdịdị ya kachasị ọhụrụ, na-emetụta netwọk ụlọ ọrụ 140 n'ụwa niile na ụlọ akụ, ụlọ ọrụ nkwukọrịta na òtù gọọmentị bụ ihe mgbaru ọsọ kachasị elu.[5]

Digital forensics

dezie

Mmapụta nke malware nke na-arụ ọrụ n'ụzọ na-enweghị ntụpọ na-eweta nnukwu nsogbu nye ndị na-eme nchọpụta nyocha dijitalụ, ndị ịdabere na inwe ike inweta ihe eji emepụta ihe dijitalụ site na ebe mpụ dị oke mkpa iji hụ na usoro njide na ịmepụta ihe akaebe nke a na-anabata n'ụlọ ikpe.

Ndetu

dezie
  1. Advanced volatile threat: New name for old malware technique?. CSO. CSO. Retrieved on 20 February 2017.
  2. Computer Viruses - Theory and Experiments. University of Michigan. Retrieved on 20 February 2017.
  3. The Art of Computer Virus Research and Defense: Memory-Resident Viruses. Archived from the original on 21 February 2017. Retrieved on 20 February 2017.
  4. The Number of the Beast. FireEye. Archived from the original on 2017-02-22. Retrieved on 2017-02-20.
  5. Fileless attacks against enterprise networks. Secure List. Secure List. Retrieved on 20 February 2017.

Njikọ mpụga

dezie