Malware AnalysisDecember 2, 2020
Threat Alert: Fileless Malware Executing in Containers
By Idan Revivo & Assaf Morag
Security researchers have identified a new type of attack where malware executes directly from memory within containers, evading common defenses and static scanning. The malware uses a rootkit to hide its processes and hijacks resources by running a crypto miner from memory, leaving a backdoor for further exploitation.
This fileless approach makes detection extremely challenging, as traditional file-based scanning cannot identify threats that exist only in memory and never touch the filesystem.
Attack Characteristics
- Memory-only execution avoiding disk-based detection
- Rootkit functionality to hide malicious processes
- Cryptocurrency mining operations running from memory
- Persistent backdoors for continued access