← Back to Blog
Malware AnalysisDecember 2, 2020

Threat Alert: Fileless Malware Executing in Containers

By Idan Revivo & Assaf Morag

Security researchers have identified a new type of attack where malware executes directly from memory within containers, evading common defenses and static scanning. The malware uses a rootkit to hide its processes and hijacks resources by running a crypto miner from memory, leaving a backdoor for further exploitation.

This fileless approach makes detection extremely challenging, as traditional file-based scanning cannot identify threats that exist only in memory and never touch the filesystem.

Attack Characteristics

  • Memory-only execution avoiding disk-based detection
  • Rootkit functionality to hide malicious processes
  • Cryptocurrency mining operations running from memory
  • Persistent backdoors for continued access