McAfee Labs says fileless cyberattacks are on the rise in 2018

Credit: Boarding1now |

McAfee Labs has released new research that reveals a shift in cybercriminals tactics away from external malware threats, towards ‘fileless’ attacks that leverage trusted Windows executables to invade systems and breach corporate networks.

With fileless attacks, threat actors do not install any software on a users computer, making a successful attack extremely hard to detect.

One particular fileless threat, CactusTorch, which can execute custom shellcode on Windows systems, has grown rapidly. It’s evident, according to McAfee Labs, that more and more actors are developing this attack at a significant rate due to the techniques success and ability to evade detection.

CactusTorch uses the NotNetToJScript technique, which loads and executes malicious .NET assemblies straight from memory. These assemblies are the smallest unit of deployment of an application, such as a .dll or .exe. As with other fileless attack techniques, DotNetToJScript does not write any part of the malicious .NET assembly on a computer’s hard drive which means traditional file scanners fail to detect these attacks.

This type of attack abuses trusted .NET libraries exposed over COM, and in this class of attack the malicious .NET Assembly is never written/dropped to disk. The entire process of loading and execution of malicious binary happens in memory at run time. Due to this, the technique bypasses most of the traditional file scanner based detection.

The growth of the ‘fileless’ threat category was also evidenced in McAfee’s recent Q2 Threat report. Many fileless malware campaigns were discovered to leverage Microsoft PowerShell to launch attacks in memory to create a backdoor into a system – surging 432% over 2017.

According to the Ponemon Institute's "The State of Endpoint Security Risk Report,"  it is estimated that fileless attacks are ten times more likely to succeed than file-based attacks.

Fileless malware takes advantage of the trust factor between security software and genuine, signed Windows applications. Because this type of attack is launched through reputable, trusted executables, these attacks are hard to detect, according to McAfee Labs.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags attackscyberFilelessMcAfeee

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.
Show Comments

Most Popular Reviews

Latest Articles


PCW Evaluation Team

Cate Bacon

Aruba Instant On AP11D

The strength of the Aruba Instant On AP11D is that the design and feature set support the modern, flexible, and mobile way of working.

Dr Prabigya Shiwakoti

Aruba Instant On AP11D

Aruba backs the AP11D up with a two-year warranty and 24/7 phone support.

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers


This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang


It really doesn’t get more “gaming laptop” than this.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?