What is fileless malware? What are some techniques for detecting it and protecting against it? Please provide a detailed description of fileless malware, a method for detecting it and at least 2 vendo

Fileless malware is simply an attachment that hides on a computer. No spyware, malware, or virus ever added to the computer. The malware hides on a computer. It works through browser tabs, folder trees, or any other hidden areas.  This way, an infected machine can be completely shut down without affecting other computers on the network. It does not require an executable or a system file in order to execute. Instead, it does not need a link file to execute because the malware maintains its control network without the presence of an executable. In short, it is a form of binary programming. Among other things, it configured to communicate with one of several command-and-control servers. Concerns have raised about a possible link to Russia or the possibility of a country-wide hack.

These attacks are not sophisticated, and organizations should keep that in mind as the additional information about the malware comes to light. It is also worth noting that even sophisticated attacks use just a few code lines to communicate with their command-and-control server. For example, an executable file used to infect the target computer included with the malware. On the other hand, a byte-file required. It means that while malicious files are typically dependent on files from the system that they attack, and most of them are dependent on an executable, these are not the files that are manipulated on the infected computer to infect the target (Tarek, Chaimae, & Habiba, 2020, March).

The cybercriminals behind this botnet created such a massive amount of the malware by this action that they were able to infect millions of devices with its control network for months, without needing to reveal any further by bringing it to the public, under their false name of Mirai Botnet. We can take advantage of an already well-known technique to generate an arbitrary value, given a sequence of 256 character hexadecimal string (bits) or textual strings. It referred to as hashing. Malware authors typically use the cryptographic hash algorithm SHA256. Like most hashing algorithms, this algorithm requires six or more bits of entropy to hash correctly. It is the use of 6 or more "passwords" or non-text, unique passwords that ensure security (Dileesh & Shanthi, 2020).

References

Tarek, R., Chaimae, S., & Habiba, C. (2020, March). Runtime API Signature for Fileless Malware Detection. In Future of Information and Communication Conference (pp. 645-654). Springer, Cham.

Dileesh, E. D., & Shanthi, A. P. (2020). M-PIVAD-Virtual Memory Based Approach against Non-Control Data Attacks. Computers & Security, 101834.