Skip to content

Services, Wiki-Artikel und Blog-Beiträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen

Malware: types, analysis and protective measures

From viruses and Trojans to ransomware, spyware, and rootkits—an overview of all types of malware, the current threat landscape, analysis methods, and proven protective measures for businesses.

Summary: Fileless malware is malware that runs entirely in memory (RAM) without writing files to the hard drive. Uses legitimate system tools: PowerShell, WMI, MSHTA, Regsvr32, LOLBins. Detection methods: Memory forensics (Volatility), ETW tracing, behavioral detection in EDR. Examples: Cobalt Strike Beacon (reflective DLL), PowerSploit, Meterpreter.

Sources & References

  1. [1] BSI Lagebericht zur IT-Sicherheit in Deutschland 2024 - BSI
  2. [2] ENISA Threat Landscape 2024: Malware - ENISA
  3. [3] Verizon DBIR 2024 - Verizon

Questions about this topic?

Our experts advise you free of charge and without obligation.

Free Consultation

About the Author

Jan Hörnemann
Jan Hörnemann

Chief Operating Officer · Prokurist

E-Mail

M.Sc. Internet-Sicherheit (if(is), Westfälische Hochschule). COO und Prokurist mit Expertise in Informationssicherheitsberatung und Security Awareness. Nachwuchsprofessor für Cyber Security an der FOM Hochschule, CISO-Referent bei der isits AG und Promovend am Graduierteninstitut NRW.

11 Publikationen
ISO 27001 Lead Auditor (PECB/TÜV) T.I.S.P. (TeleTrusT) ITIL 4 (PeopleCert) BSI IT-Grundschutz-Praktiker (DGI) Ext. ISB (TÜV) BSI CyberRisikoCheck CEH (EC-Council)
This article was last edited on 03/29/2026. Responsible: Jan Hörnemann, Chief Operating Officer · Prokurist at AWARE7 GmbH. License: CC BY 4.0 - free use with attribution: "AWARE7 GmbH, https://a7.de"