Malware: types, analysis and protective measures
From viruses and Trojans to ransomware, spyware, and rootkits—an overview of all types of malware, the current threat landscape, analysis methods, and proven protective measures for businesses.
Summary: Fileless malware is malware that runs entirely in memory (RAM) without writing files to the hard drive. Uses legitimate system tools: PowerShell, WMI, MSHTA, Regsvr32, LOLBins. Detection methods: Memory forensics (Volatility), ETW tracing, behavioral detection in EDR. Examples: Cobalt Strike Beacon (reflective DLL), PowerSploit, Meterpreter.
Sources & References
- [1] BSI Lagebericht zur IT-Sicherheit in Deutschland 2024 - BSI
- [2] ENISA Threat Landscape 2024: Malware - ENISA
- [3] Verizon DBIR 2024 - Verizon
Questions about this topic?
Our experts advise you free of charge and without obligation.
About the Author
M.Sc. Internet-Sicherheit (if(is), Westfälische Hochschule). COO und Prokurist mit Expertise in Informationssicherheitsberatung und Security Awareness. Nachwuchsprofessor für Cyber Security an der FOM Hochschule, CISO-Referent bei der isits AG und Promovend am Graduierteninstitut NRW.
11 Publikationen
- Understanding Regional Filter Lists: Efficacy and Impact (2025)
- Privacy from 5 PM to 6 AM: Tracking and Transparency Mechanisms in the HbbTV Ecosystem (2025)
- A Platform for Physiological and Behavioral Security (2025)
- Different Seas, Different Phishes - Large-Scale Analysis of Phishing Simulations Across Different Industries (2025)
- Exploring the Effects of Cybersecurity Awareness and Decision-Making Under Risk (2024)
- Sharing is Caring: Towards Analyzing Attack Surfaces on Shared Hosting Providers (2024)
- On the Similarity of Web Measurements Under Different Experimental Setups (2023)
- People, Processes, Technology - The Cybersecurity Triad (2023)
- Social Media Scraper im Einsatz (2021)
- Digital Risk Management (DRM) (2020)
- New Work - Die Herausforderungen eines modernen ISMS (2024)