Skip to main content
Fileless Attacks

Fileless Attacks


Fileless Attacks

Fileless Attacks inject malicious code into RAM memory and exploit approved applications on targeted devices to achieve their objectives and thwart detection.

With traditional file-based malware, the attacker must write a file to the local drive of the targeted device, which is an action that is more easily detected by modern security controls. By contrast, Fileless Attacks inject malicious code only into RAM memory (hence fileless) and exploit approved applications on targeted devices. This makes them far more difficult to detect. Fileless Attacks commonly exploit administrative utilities such as Windows Powershell or Windows Management Instrumentation (WMI).

Seeking Clarity?

View the Cybersecurity Dictionary for top terms searched by your peers.

Explore the Dictionary

Related Assets

March 29, 2017

Attack and Penetration Services

Learn how our experts work to expose weakness to validate your security program.

See Details

November 10, 2017

Unmanaged PowerShell Binaries and Endpoint Protection

Optiv recently completed our 2017 endpoint security solution evaluation. The primary focus of the evaluation was to test the solutions’ efficacy acros...

See Details

How Can We Help?

Let us know what you need, and we will have an Optiv professional contact you shortly.

Privacy Policy

Stay in the Know

For all the latest cybersecurity and Optiv news, subscribe to our blog and connect with us on Social.


Join our Email List

We take your privacy seriously and promise never to share your email with anyone.

Stay Connected

Find cybersecurity Events in your area.