{"id":61018,"date":"2019-05-06T14:14:50","date_gmt":"2019-05-06T19:14:50","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=61018"},"modified":"2019-05-06T14:14:56","modified_gmt":"2019-05-06T19:14:56","slug":"fileless-infections-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/","title":{"rendered":"Fileless Infections Account For 35% of Cyber Attacks"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Traditional Malware vs. Fileless Infections<\/h3>\n\n\n\n<p>Traditional malware spreads through file-based attacks.  This means they rely on an executable file to install the malware.  Once the executable file that holds the malware is installed, the malware can infect accordingly. <\/p>\n\n\n\n<p>Fileless attacks do not rely on an executable.  Instead, they inject malicious code into legitimate scripting engines such as PowerShell or CScript.  Since scripting engines are often not scanned for security purposes, fileless attacks are 10 times more successful than file-based attacks.  Due to the increased success rates, it should come as no surprise that<a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2019\/05\/06\/flying-under-the-radar-the-biggest-malware-threats-hiding-in-plain-sight\/#f7e8bfe19bd5\"> fileless malware attacks accounted for 35% of all cyber attacks<\/a> in 2018.   <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Being Proactive<\/h4>\n\n\n\n<p>Few security solutions thwart fileless scripting attacks.  However, it is still imperative users find a program that does include this protection, considering a third of all cyber attacks are executing this way.  <\/p>\n\n\n\n<p><a href=\"http:\/\/www.pcmatic.com\/pro\">PC Matic Pro<\/a> is available for business use and includes an automated application whitelist coupled with a malicious script block.  The whitelist protection offered effectively blocks malicious file-based attacks, and their patent-pending hooking process protects devices from being victimized by fileless infections.  <a href=\"http:\/\/www.pcmatic.com\/consumer\">PC Matic<\/a> also possesses these two layers of protection and is available for home users. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Traditional Malware vs. Fileless Infections Traditional malware spreads through file-based attacks. This means they rely on an executable file to install the malware. Once the executable file that holds the malware is installed, the malware can infect accordingly. Fileless attacks do not rely on an executable. Instead, they inject malicious code into legitimate scripting engines [&hellip;]<\/p>\n","protected":false},"author":54,"featured_media":60443,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7,183],"tags":[5645],"class_list":["post-61018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","category-tips","tag-fileless-infections"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fileless Infections Account For 35% of Cyber Attacks<\/title>\n<meta name=\"description\" content=\"Fileless-based infections have been found accounting for over one-third of all cyber attacks during 2018. Unfortunately, very few security...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fileless Infections Account For 35% of Cyber Attacks\" \/>\n<meta property=\"og:description\" content=\"Fileless-based infections have been found accounting for over one-third of all cyber attacks during 2018. Unfortunately, very few security...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2019-05-06T19:14:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-06T19:14:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/downloading_malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Fileless Infections Account For 35% of Cyber Attacks\",\"datePublished\":\"2019-05-06T19:14:50+00:00\",\"dateModified\":\"2019-05-06T19:14:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/\"},\"wordCount\":200,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/downloading_malware.jpg\",\"keywords\":[\"fileless infections\"],\"articleSection\":[\"Newsletter\",\"tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/\",\"name\":\"Fileless Infections Account For 35% of Cyber Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/downloading_malware.jpg\",\"datePublished\":\"2019-05-06T19:14:50+00:00\",\"dateModified\":\"2019-05-06T19:14:56+00:00\",\"description\":\"Fileless-based infections have been found accounting for over one-third of all cyber attacks during 2018. Unfortunately, very few security...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/downloading_malware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/downloading_malware.jpg\",\"width\":730,\"height\":414,\"caption\":\"Malware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/fileless-infections-cyber-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fileless Infections Account For 35% of Cyber Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fileless Infections Account For 35% of Cyber Attacks","description":"Fileless-based infections have been found accounting for over one-third of all cyber attacks during 2018. Unfortunately, very few security...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Fileless Infections Account For 35% of Cyber Attacks","og_description":"Fileless-based infections have been found accounting for over one-third of all cyber attacks during 2018. Unfortunately, very few security...","og_url":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2019-05-06T19:14:50+00:00","article_modified_time":"2019-05-06T19:14:56+00:00","og_image":[{"width":730,"height":414,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/downloading_malware.jpg","type":"image\/jpeg"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Fileless Infections Account For 35% of Cyber Attacks","datePublished":"2019-05-06T19:14:50+00:00","dateModified":"2019-05-06T19:14:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/"},"wordCount":200,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/downloading_malware.jpg","keywords":["fileless infections"],"articleSection":["Newsletter","tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/","url":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/","name":"Fileless Infections Account For 35% of Cyber Attacks","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/downloading_malware.jpg","datePublished":"2019-05-06T19:14:50+00:00","dateModified":"2019-05-06T19:14:56+00:00","description":"Fileless-based infections have been found accounting for over one-third of all cyber attacks during 2018. Unfortunately, very few security...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/downloading_malware.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/downloading_malware.jpg","width":730,"height":414,"caption":"Malware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/fileless-infections-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Fileless Infections Account For 35% of Cyber Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61018","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=61018"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61018\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/60443"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=61018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=61018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=61018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}