Fileless Malware: The Attack That Lives in Memory

Fileless malware is one of the most dangerous attack types out there — it never writes to your hard drive, lives entirely in RAM, and can steal your credentials before your antivirus has any idea it's there. In this episode, I bring in Dr. Mike Saylor — my co-author on Learning Ransomware Response & Recovery — to break down exactly how this attack works, why it's so hard to detect, and what you can actually do to protect yourself.
Mike walks us through how fileless malware hides in memory, how bad guys maintain their foothold even after a reboot by modifying registry keys or rewriting the operating system itself, and why the ArcGIS attack is a perfect real-world example — attackers sitting undetected inside a network for two years. We also get into MFA, specifically why a lot of MFA setups are done wrong, why passkeys are the better answer, and when it's time to bring in an EDR or XDR tool.
Fair warning: the action items here are a bit more advanced than our usual stuff. Think of this as the 401k conversation — don't have it before you've built your emergency fund. But this is stuff you absolutely need to know.
00:01:26 - Welcome & intro
00:04:43 - What is fileless malware?
00:09:16 - How fileless malware achieves persistence (ArcGIS case study)
00:15:02 - Can fileless malware spread beyond one machine?
00:16:43 - Defending yourself: MFA done right
00:20:38 - Why passkeys beat MFA
00:23:00 - EDR and XDR explained
00:28:03 - How modern EDR tools detect fileless malware
00:30:01 - Wrap-up and action items
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we'll get into something, uh, that I'll be honest,
Speaker:pushed the edges of my knowledge We're talking about fless malware, the kind
Speaker:of attack that never touches your hard drive lives entirely in memory and can
Speaker:steal your credentials before antivirus.
Speaker:Even knows that it's there.
Speaker:Uh, we've of course got our, my co-author, Dr. Mike Sailor with me,
Speaker:and he breaks it down in a way that, that I think helps make it sense.
Speaker:But more importantly, the at, at the end of the episode, we get
Speaker:into some real things that you can do to protect yourself, not only
Speaker:from this threat, but many others.
Speaker:And I think of particular interest as a discussion we
Speaker:have on, uh, Mike's view of MFA.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr. Backup.
Speaker:And I've been passionate about backup and recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss there were no backups of the production
Speaker:database that we just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated backup admins into cyber recovery heroes.
Speaker:This is to back up, wrap up.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host, w Curtis Preston, AKA, Mr. Backup, and I have with me a guide that
Speaker:is, I think, just as excited as I am, that I got rid of a problematic tenant.
Speaker:Yes, I am excited.
Speaker:Well, I'm also kind of sad, but it's okay.
Speaker:I hope you have less stress over the next many, many months,
Speaker:Curtis, and I hope that, uh,
Speaker:Yeah.
Speaker:you enjoy having the house
Speaker:Yeah.
Speaker:Uh, it, it's been something we started doing, you know,
Speaker:for those that don't know.
Speaker:About a few years ago we've been experimenting with
Speaker:renting rooms out and, uh.
Speaker:Let's just say not all of the tenants are the same.
Speaker:And, uh, there was a very problematic tenant and I am now problematic
Speaker:tenant free as of two days ago.
Speaker:And, uh, like I said, you were, you were my problematic tenant advisor
Speaker:I think during this, uh, as usual,
Speaker:to be your advisor for many
Speaker:things.
Speaker:Yes.
Speaker:All right.
Speaker:Speaking of problematic tenets, we also have Dr. Mike Sailor on with us, my
Speaker:co-author of our book, learning Ransomware Response and Recovery, which if you're
Speaker:watching us on YouTube by the same channel name, you can see me pointing up at it,
Speaker:uh, that, that just started shipping.
Speaker:Are you excited, Mike?
Speaker:I am so excited.
Speaker:You know you're gonna, you're gonna get, uh, you're gonna get one day, but it's
Speaker:gonna show up in our hot little hands.
Speaker:I'm very excited about that.
Speaker:Hmm.
Speaker:I expect a signed copy from you, sir.
Speaker:Yeah.
Speaker:We'll have to exchange copies
Speaker:then.
Speaker:'cause I, I would love to do
Speaker:yeah, yeah.
Speaker:Uh, maybe I'll just show up at your house or something.
Speaker:Hmm.
Speaker:Come
Speaker:on,
Speaker:get
Speaker:bring your boots,
Speaker:get some barbecue.
Speaker:put you to work.
Speaker:Yeah.
Speaker:Yeah.
Speaker:All right.
Speaker:Yeah, so for, for those that don't know, Mike and I have never met in person.
Speaker:Just, uh, you know, virtually like this in the Matrix.
Speaker:So, um, so today, Mike, I'm gonna be very blunt.
Speaker:A lot of times I, you know, I, I play the dumb guy in the room and I, I just
Speaker:ask dumb questions, but I actually know what the answer is in this episode.
Speaker:Uh, I am definitely
Speaker:Don't take my job.
Speaker:Wait, what was that persona?
Speaker:Don't take my job.
Speaker:yeah.
Speaker:Usually you're playing the guy, the dumb guy in the room on
Speaker:our, our typical recordings.
Speaker:But in this episode, uh, I think both of us are playing the dumb guy in the room.
Speaker:But the, but in this case, this is this thing that we're gonna talk about
Speaker:today, I think is very interesting.
Speaker:But it definitely, I'm, I'm gonna say a couple things about it.
Speaker:One is it's definitely way out there on the edge of my, my understanding.
Speaker:And two, I think this is one of those things where.
Speaker:You should listen to some of the other episodes first, right?
Speaker:Some of the things, you know, solve those things first.
Speaker:But this is something I do think you should be aware of, but when we, when we
Speaker:get to the, to the, um, do you call it?
Speaker:Um.
Speaker:Um, the, the action items, the action items, I, I would say, are a little
Speaker:bit more advanced than the typical action items that we talk about.
Speaker:And so it's a bit like, you know, don't start talking about investing in a 401k.
Speaker:You don't have like a, a, um.
Speaker:An emergency fund.
Speaker:Right.
Speaker:That, that's, it's sort of like that.
Speaker:So this is sort of the 401k part.
Speaker:But anyway, we are talking today about something called violist malware.
Speaker:Do you wanna explain that to, to the mere mortals in the room?
Speaker:Sure.
Speaker:So malware, traditionally, and,
Speaker:and, and, you know, malware short for malicious software, software being
Speaker:indicative of something that you would download and install on your computer.
Speaker:And tools, security tools that are out there today to, to try and detect
Speaker:and prevent that, uh, fundamentally look for things that are written to
Speaker:the, the hard drive on a computer.
Speaker:So if I download it, it, it traverses memory, but then as I, depending on,
Speaker:on what it is, as I interact with that, it's, it's installed or written to or
Speaker:saved to hard drive in your computer.
Speaker:And so, uh, one of the efforts of bad guys to try and, uh, maintain some success
Speaker:at infecting computers, and it, it, it is limited to certain types of attacks.
Speaker:Uh, so instead of downloading something to be written to the, to
Speaker:the hard drive in your computer, it's downloaded and is simply resident
Speaker:in the memory of the computer.
Speaker:Uh, and it, there are some tactics too.
Speaker:Uh, 'cause if, if you think about it, uh, similar to my memory, when
Speaker:I go to sleep at night, it, you get, you know, completely erased.
Speaker:Uh, I wake up fresh the next day.
Speaker:Well, computers are very similar when you turn it off and it's truly powered off.
Speaker:Um, that memory also called volatile memory.
Speaker:Uh, which requires power to maintain its content goes away.
Speaker:Uh, so I've got malware and memory and I turn my computer off and restart it.
Speaker:It shouldn't be there anymore.
Speaker:Uh, but bad guys have have figured that out.
Speaker:Uh, and so what they'll do is instead of writing hardware to, uh,
Speaker:writing software to your hardware, uh, they will make modifications to
Speaker:the way your operating system works.
Speaker:So that if you think I'll just turn it off and erase all that bad stuff and turn
Speaker:it back on when, when it comes back on, uh, what they've written to the operating
Speaker:system, reinfect your memory, uh, and they're able to continue that attack.
Speaker:Mike.
Speaker:This is fascinating 'cause I don't think most people think about this.
Speaker:The second use case you talked about though, modifying the operating system.
Speaker:I know I've heard in the past where, uh, malware actors, uh,
Speaker:infect the UEFI boot on for like a window system that's sort of like.
Speaker:Things that happen before the operating system comes up, it's
Speaker:not technically written to disc.
Speaker:Are those the sort of things you're talking about in terms of modifying
Speaker:the operating system in order to sort of provide that persistence without
Speaker:necessarily writing to a hard disc or SSD.
Speaker:Sort of, uh, but, uh, some of what you described, the UFE,
Speaker:the UA, the UEFI also called the baseboard management controller.
Speaker:Um.
Speaker:Those are, you have to be in, you have to be on the same network, like physical
Speaker:network and, and or even physically connected for those types of attacks.
Speaker:But definitely possible.
Speaker:Uh, what,
Speaker:what most bad guys are doing with the fless memory stuff is it's, uh,
Speaker:you know, embedded in an email or,
Speaker:uh, embedded in a, a website.
Speaker:Um, and so.
Speaker:A lot of that content, like if you, if you open a, an email that's got
Speaker:a lot of rich content like HTML, those graphics are stored in memory
Speaker:while you're viewing that file.
Speaker:When you go to that website and there's animation or a lot of content,
Speaker:a lot of that is stored in memory.
Speaker:Uh, to make the best, you know, your best.
Speaker:Uh.
Speaker:Uh, interaction with whatever, you know, that that artwork or, or website is.
Speaker:Um, and so that's what they're taking advantage of.
Speaker:What is it that's being written to memory during these different types
Speaker:of activities that I can hide malware in that isn't gonna be detected by
Speaker:traditional antivirus anti M malware software that's looking for stuff
Speaker:getting written to the disc now today.
Speaker:some of the newer computers have these, you know, TPM modules and
Speaker:different hardware that looks for rogue addressing in memory.
Speaker:Rogue Read writes in memory.
Speaker:Um, and so it's getting better and I think we're evolving into, you know, some
Speaker:capabilities to, to mitigate that threat.
Speaker:But for the most part, you know, people are, are still
Speaker:being victimized by this fless
Speaker:Do you wanna talk about the arc, GIS, um, attack and how
Speaker:this falls under that, um, idea?
Speaker:Sure.
Speaker:And, and you know, in, in another episode, we, we, we covered living off the land,
Speaker:uh, type of attacks and similarly, uh, memory resident or file this, uh, malware.
Speaker:It isn't talked about as much as part of an overall attack
Speaker:because it was just a piece of it.
Speaker:And very often you'll get the file is malware component that then evolves
Speaker:into living off the land or vice versa, or even combined at the same time.
Speaker:And so, uh, you know, living off the land, we, we had talked about
Speaker:PowerShell as being one of those, uh, very frequently used tools.
Speaker:Same happens in, in, uh, fileless.
Speaker:attacks, you know, we compromise memory.
Speaker:Uh, a lot of times memory is where credentials are stored.
Speaker:Uh, if I'm logged in as admin, especially if it's across a session, uh, RDP or
Speaker:or, or in a web session, a lot of that's stored in memory and I can utilize
Speaker:that then to run services with those credentials, um, or simply run, um.
Speaker:Run malware and memory to harvest those credentials.
Speaker:And so very often, the file memory, the fileless, uh, uh, malware is very
Speaker:focused on credentials and how can I use session, uh, and credential type,
Speaker:um, uh, information to conduct more.
Speaker:I guess in some cases, living off the land would be an evolution or
Speaker:simply, uh, you know, remote access.
Speaker:You know, those, those, uh, initial access brokers, that's all they're
Speaker:after is credentials and so they'll.
Speaker:they'll.
Speaker:infect a website, uh, and, and do like a waterhole attack and, and get a bunch
Speaker:of people to go to this website and then just harvest all those credentials.
Speaker:Um, but in particular attacks.
Speaker:Um, and, and there's, there's tons of examples of, of this, uh,
Speaker:where it's, it's a, uh, it's a spectrum of of, of attack types.
Speaker:You know, is it just credentials and persistence or is it That evolves into
Speaker:something a lot more complex and, and broad sweeping across a whole enterprise.
Speaker:Um, and one of the
Speaker:things that I mentioned a second ago is, you know, I can, I can infect
Speaker:a machine and in order to maintain persistence, I'm the, one of the first
Speaker:things I'll do is modify the registry.
Speaker:Uh, and there's, there's a couple of different keys in the registry
Speaker:for startup and, uh, initialization.
Speaker:And I will just inject myself into that in a. Kind of a nondescript way so
Speaker:that you, you know, it doesn't say, you know, reinfect this computer on startup.
Speaker:It says something, you know, you wouldn't necessarily recognize.
Speaker:Um, or it looks, it looks like something that might need to be there, so that
Speaker:when you reboot that computer, uh, it, it reinfect, you know, it, um, uh, I maintain
Speaker:that persistence even after reboot.
Speaker:I know that
Speaker:yes, sir.
Speaker:in the, in the case of the Arc GIS attack, it looks like
Speaker:they, they modified the actual.
Speaker:Base software, right.
Speaker:That, that the tool did.
Speaker:So that anytime they would reload, they, anytime they reboot the server, they would
Speaker:restart that software and that would then, um, implement their, their hack, whatever,
Speaker:whatever it was that they were doing.
Speaker:And they were in there for two years.
Speaker:Yeah, there's a lot of trip wires and, and contingencies
Speaker:that bad guys will, will employ.
Speaker:And sometimes you don't know what those are, uh, until you, you trip over one.
Speaker:And so we see this a lot in, in forensics.
Speaker:Uh, where bad guys have stuff on their computer and it, and it's completely
Speaker:fine in its current state, but once you, once you reboot the computer
Speaker:or you start it up in safe mode or whatever it is, uh, their malware is
Speaker:looking for those types of activities.
Speaker:And then it triggers some, know, uh, you know, backdoor,
Speaker:booby, trap, what have you.
Speaker:And so in, in the case that you had mentioned, what bad guys
Speaker:did was they, um, they created some persistence by rewriting.
Speaker:Uh, the operating system on the disc during a reboot.
Speaker:Uh, so they're in memory, they modify the startup file and, you know, there's
Speaker:any number of, um, references to startup files, whether it's registry or uh, or
Speaker:some initialization file, whatever it is.
Speaker:Um, and so on, on reboot.
Speaker:It then writes like a ton of things do.
Speaker:As soon as you tell a machine to shut down, it does nothing but write stuff.
Speaker:And so it's hiding.
Speaker:Its its activities in the, in the trash, right?
Speaker:You kind of like when, when, uh, the Millennium Falcon let go of the destroyer
Speaker:before they went to Lightspeed, they, they let all their trash go and they
Speaker:just un docked with all the trash.
Speaker:Well, very similarly, uh, file this memory.
Speaker:Bad guys realize what's going on.
Speaker:And so even, fileless malware resident in memory can force.
Speaker:An over utilization of resources to make you think, oh, my com my, I bet my
Speaker:computer will work better after I reboot.
Speaker:And so the, the malware now goes, all right, I see the, the, the
Speaker:initialization command for reboot.
Speaker:I'm gonna start writing stuff to the drive while everything
Speaker:else is, and when it reboots.
Speaker:I've actually got stuff now on the drive that can run.
Speaker:And be more effective than just me in memory.
Speaker:But at the same time, when it reboots, I'll be back in memory.
Speaker:Also, one in your case, uh, Curtis, uh, they rewrote the operating
Speaker:system so that they were like hardcoded embedded in that malware.
Speaker:You would've had to have completely reformatted and rebuilt that
Speaker:machine from scratch to get rid of
Speaker:Yeah, which is what they ended up doing.
Speaker:They had to like re-image all the systems.
Speaker:By the way.
Speaker:Great Star, star Wars reference, uh, bringing Star Wars into, uh, ransomware.
Speaker:So you're talking about fileless malware.
Speaker:Does that imply though that it is limited in reach to just a single machine,
Speaker:that its world is that single machine?
Speaker:I know you talked about maybe a bad actor might have multiple people go visit the
Speaker:same website, like the watering hole example, but really kind of like what it's
Speaker:doing is limited in scope to that machine.
Speaker:It's not necessarily spreading across to other machines and that sort
Speaker:of thing, or is that not the case?
Speaker:Well, truly, uh, memory only resident malware would only affect the machine
Speaker:that it, that, um, that's hosting it.
Speaker:Um.
Speaker:But very rarely does it stay in memory.
Speaker:Uh, that's just, it's, it's
Speaker:springboard, it's jumping off
Speaker:point and that's it.
Speaker:That's the silent, you know, stealthy phase one recon, um,
Speaker:foothold, um, part of the attack.
Speaker:Uh, it can escalate very quickly and, and once it's figured out what it
Speaker:needs to do next, uh, whether that's infect the rest of this computer or
Speaker:realizing it has access to a bunch of stuff, which is memory resident.
Speaker:So when you, when you log into a network and you've got a bunch of
Speaker:network shares, all that, all those authentication tokens come through memory.
Speaker:Mm-hmm.
Speaker:malware can go, oh, I know you've got a C drive, an S drive.
Speaker:A U drive, right?
Speaker:And so it realizes all that stuff, and when it's ready, it'll deploy and,
Speaker:and become more active, uh, across a physical, more of the physical,
Speaker:uh, parts of the environment.
Speaker:You, you know, you got, you, you, you put the phrase silent, but
Speaker:deadly in my, uh, in my brain.
Speaker:Uh, because inside I'm still five.
Speaker:Um, all right, let's talk, let's talk a little bit about what we can do and, and
Speaker:when we were looking at this particular episode, this is why I started, um, saying
Speaker:that I, I, I think the first one here on our list is one that we talk a lot
Speaker:about, and that is MFA and specifically, uh, doing, um, phishing resistant, MFA.
Speaker:Do you wanna talk what that is?
Speaker:Uh,
Speaker:well, I have a, I have a, I have an inherent, uh, uh, bias with,
Speaker:with MFA, not because the, uh.
Speaker:I think technically MFA is good, um, but realistically it's, it's
Speaker:rarely implemented effectively.
Speaker:In other words, you know, a company can turn MFA on, but then they
Speaker:let people store their passwords and their credentials in the
Speaker:browser, or let this computer be trusted so I don't have to do MFA.
Speaker:Again, MFA only works if you do it every
Speaker:Mm-hmm.
Speaker:It's only effective if you do it every time.
Speaker:And bad guys know that we we're lazy, so we'll save stuff.
Speaker:Well now when malware comes into our environment, one of the first
Speaker:places it looks is our web cache.
Speaker:Like what have you stored?
Speaker:And if I can, and I'm glad you, I'm glad you've developed the, the discipline of
Speaker:using dedicated browsers for your banking.
Speaker:Because what bad guys will do is they'll, they'll have an infected website and
Speaker:just by going there, it harvests all the current session tokens from all
Speaker:of your other tabs that you have open.
Speaker:Uh, and so now if, if I can do that and, and and be quick about it, I could
Speaker:potentially hijack a session you've got open with, you know, Google or your
Speaker:bank or, um, whatever else, office 365.
Speaker:Um, if I've got a, an MFA token outta your browser, I can quickly
Speaker:hijack that session and potentially, you know, uh, authenticate without
Speaker:any bells and whistles going off.
Speaker:So are you saying then, Mike, that the best form of security is
Speaker:to write post-it notes with your passwords and keep 'em on your desk?
Speaker:No, no, I, I'm saying that you need, you need to find what works for you
Speaker:from a security perspective that allows you to do whatever that is every time.
Speaker:You know, we, I was the CIO for a financial institution and we implemented
Speaker:biometrics and as you use the biometrics, it incorporated both the bios, the
Speaker:BitLocker encryption, and your office 365.
Speaker:Well, the workforce would not support that.
Speaker:They hated biometrics and they, they intentionally made a,
Speaker:a political issue out of it.
Speaker:And we had, we ended up having to give the, the executive over
Speaker:that team the 28 character.
Speaker:BitLocker key for all those laptops because it didn't fit the culture.
Speaker:And from a, from an audit compliance governance perspective, you wanna
Speaker:make sure that the controls that you implement are designed well.
Speaker:'cause if they're not, people are gonna circumvent them and
Speaker:they, they're just not effective.
Speaker:Uh, the, the analogy I use a lot is, uh, Texas a and m University,
Speaker:whenever they build a new building.
Speaker:They don't pave the sidewalks, they let people walk through the
Speaker:grass for a period of time, and that's where they put the sidewalk.
Speaker:So that's a good control design.
Speaker:So from a security perspective, whether that's MFA or passwords or whatever
Speaker:it is, figure out what's gonna work best for you and that, you know,
Speaker:complies with minimum requirements from an organization or whatever.
Speaker:Using the same password everywhere is bad.
Speaker:Um, writing it down's bad, saving, it's bad trusting a computer's bad.
Speaker:So what is it that I can do that isn't bad that I'm okay doing every time?
Speaker:You just gotta figure that out.
Speaker:And so, uh, your, your response, your initial response was interesting.
Speaker:And so obviously you're not saying MFA bad, you're just saying per perhaps
Speaker:maybe a lot of implementations of MFA are bad, but also, and I I think you
Speaker:would agree that, that paske would be better, but MFA it it, but I, I don't
Speaker:think you're saying don't do MFA.
Speaker:Uh, like, you know, this is a good, better, best thing, right?
Speaker:So don't do passwords without MFA.
Speaker:Please don't do that.
Speaker:Right?
Speaker:So if you have to use passwords, you're gonna use MFA.
Speaker:But what, I don't wanna put words in your mouth, but let me, let me see
Speaker:if I can tell me if I, if I'm right.
Speaker:And that is, you know, obviously don't do passwords that matter without
Speaker:MFA and don't do MFA in a way that, like, I, I liked your, your way of
Speaker:the, this idea of not allowing people to save those things in a way that.
Speaker:Would allow that, that session to be hacked, uh, and try to get to a
Speaker:place where MFA is no longer relevant.
Speaker:Try to get to a place where we're doing a, a Fido compliant passkey.
Speaker:How did I do?
Speaker:I think you did really well.
Speaker:And one of the things I want to add to that is the, the value of MFA.
Speaker:I think a lot of people think MFA is just designed to keep bad people out.
Speaker:MFA is also designed to let you know when bad people are trying to get in,
Speaker:Mm-hmm.
Speaker:So you get an email that goes, here's your code.
Speaker:Like, I didn't ask for a code.
Speaker:Well, maybe now I need to go change my password.
Speaker:Because if they were able to get to the code part, they already know my password.
Speaker:Right.
Speaker:So it's also an indication that someone other than you might be
Speaker:trying to access your accounts
Speaker:I got a request I,
Speaker:just click accept.
Speaker:a Venmo code today, by the way.
Speaker:Oh, right on.
Speaker:Well, so if you, if you save your MFA, if you trust that machine,
Speaker:then you won't know when somebody is trying to access your account.
Speaker:So MFA.
Speaker:So passwords.
Speaker:Passwords are just a, a delay.
Speaker:Bad guys can get your account if it only has a password on it over over time.
Speaker:You know, it's not today, it's probably not tomorrow, it could be
Speaker:next year, especially if you use the same password across multiple accounts.
Speaker:But if you use MFA on top of a password, you're at least
Speaker:making it more difficult, right?
Speaker:So in the real world, uh.
Speaker:Do you just have a lock on your handle or do you also have a deadbolt?
Speaker:Right, so the multifactor part of that is having more than one thing that
Speaker:people need to authenticate to an account and the multifactor authentication
Speaker:part of that would be every time.
Speaker:So when you leave your house, do you just lock the the handle or do you also
Speaker:lock the deadbolt every time?
Speaker:Curtis Locks, neither
Speaker:Actually, you know what?
Speaker:doors locked themselves.
Speaker:you know what I like your, some would say kinetic example.
Speaker:Um, my new word, by the way, my, I have smart locks.
Speaker:My smart locks are for me.
Speaker:And what they do is they lock five minutes.
Speaker:They lock every five minutes whether I'm inside the house or outside the house.
Speaker:So if I forget to lock them, they just lock.
Speaker:Um, anyway, uh, so in interest of time, I wanna move on to this.
Speaker:Again, this is a maturity level.
Speaker:One of the, one of the first things, once we get all these base things
Speaker:outta the way, it's time to tar start talking about EDR or XDR.
Speaker:Do you want to talk about what that is and why?
Speaker:Why I might wanna put it in and the kinds of things I might want
Speaker:to think about if I'm doing that,
Speaker:So EDR today is an evolution of just, you know, our old antivirus, anti-malware.
Speaker:Um, and it's designed to.
Speaker:by the way, uh, endpoint
Speaker:endpoint detection
Speaker:response.
Speaker:So anti-malware historically is really good at saying that that looks bad
Speaker:and I'm not gonna let it do anything.
Speaker:So we just quarantine it and then you would have to go into the console and
Speaker:look at all the stuff that's quarantined and decide, uh, I, I need that, or
Speaker:I don't, uh, you know, delete it or make sure this doesn't happen again.
Speaker:And that was typically on a. On one machine to one machine basis.
Speaker:And then over time, they figured out a way to network all that together so
Speaker:that the people in it or the people that care can log into just one screen
Speaker:and see everybody's, uh, you know, the status of everybody's, uh, antivirus,
Speaker:anti malware, uh, but very rarely was it capable of, of taking action on its own.
Speaker:Right?
Speaker:So, aside from quarantining, it didn't rewrite rules or policy,
Speaker:uh, it didn't think ahead.
Speaker:Uh, it didn't correlate events across different devices to say, well, I think
Speaker:it started on Bob's computer and then it ended up on Sally's computer and,
Speaker:you know, it changed something, but I think it's the same attack and it
Speaker:came from the same place and just not very good analytics and correlation.
Speaker:So EDR is an evolution of that.
Speaker:Uh, so with EDR and especially some of the newer ones that have some AI
Speaker:embedded in it, uh, it can take, um.
Speaker:You know, informed or intelligent action.
Speaker:Uh, so in addition to saying, you know, user on this computer did something
Speaker:stupid or something weird got installed and it's doing something stupid, so
Speaker:now I can con, I can quarantine or isolate the device, the whole device
Speaker:from the network or just the file or just its activity or just the user.
Speaker:And if I've got it configured right.
Speaker:And I think the user's compromised.
Speaker:My EDR can now reach out to active directory on my network and suspend
Speaker:that user account from doing anything anywhere else in my environment.
Speaker:So whether that's Office 365 or uh, remote access, or whatever the case may be.
Speaker:And then the other important part about
Speaker:uh, EDR tools today is their ability to integrate into much broader
Speaker:cybersecurity tools like XDR.
Speaker:So extended detection response.
Speaker:Is XDR and so on the ED on the EDR level, I can only see what's going
Speaker:on on my computers and my servers.
Speaker:So I don't see network traffic, I don't see firewall, I don't
Speaker:see anything in the cloud.
Speaker:So you need an XDR tool that collects what we would consult the anything on the
Speaker:inside of a network we call, uh, east West traffic and anything coming in and out of
Speaker:the network we call North South traffic.
Speaker:So EDR is good at East, west XDR on its own is good.
Speaker:At north South, you really need both to get the whole north, south,
Speaker:north, south, east, west traffic.
Speaker:So you've got a better picture of what came in your environment, what's going
Speaker:out of your environment, what's happening inside your environment, and with those
Speaker:tools collectively now, if an endpoint gets compromised inside your network.
Speaker:I can look in, I can look at the firewall.
Speaker:Where'd it go?
Speaker:Where's it, who's it talking to?
Speaker:Can I block that IP address?
Speaker:Can I write rules on the firewall?
Speaker:Can I isolate the machine?
Speaker:Can I suspend the user?
Speaker:Can I look across the entire environment and all my email and all the attachments
Speaker:and figure out what's going on here and how can I prevent this from spreading?
Speaker:It's, it's a pretty huge, uh, capability, um, uh, with the
Speaker:tools that are out there today.
Speaker:And that would also cover fileless malware.
Speaker:It would, so it's, uh, more recent EDR tools.
Speaker:Look at memory resident.
Speaker:And so there's agents on each computer.
Speaker:Uh, we use Huntress as an example.
Speaker:Uh, and Huntress is amazing at doing.
Speaker:Uh, volatile memory analysis, uh, behavior analysis.
Speaker:Um, it sandboxes things.
Speaker:So the, for the couple of microseconds after you install something, it goes,
Speaker:lemme see how you're gonna behave.
Speaker:even though some malware today will behave nicely at first, um, it
Speaker:continues to do a pretty good job.
Speaker:And then it's integration with all these other tools as far
Speaker:as the ability to respond and remediates, uh, pretty impressive.
Speaker:Yeah, I, you know, when I was, um, hang on, I went the wrong way.
Speaker:I was getting ready for the book.
Speaker:I got this little thing right.
Speaker:I'm,
Speaker:What is it, say Curtis, or people who are
Speaker:a afternoon read.
Speaker:As you can see,
Speaker:The heart of memory forensics.
Speaker:Yep.
Speaker:it's a. It's, it's 800 pages, I'm just saying.
Speaker:Anyway, uh, yeah, memory forensics, you know, definitely an advanced topic.
Speaker:I like this idea of, of having a tool that can.
Speaker:They can do, uh, some of that work for you.
Speaker:Um, all right, so the, I I like the idea, you know, we talked once again reiterated
Speaker:the idea of putting more barriers in the way of, um, if someone steals your
Speaker:credentials, more barriers in the way of, of them being able to use those.
Speaker:I like this idea.
Speaker:Uh, again, you, you, you, you said more than once, you said this idea of
Speaker:not saving the things that you know.
Speaker:You know, and, and you shouldn't do it as a person, but it sounds like in a, in
Speaker:a corporate environment, you should be setting up so that they're not able to
Speaker:save that for the credentials that matter.
Speaker:Uh
Speaker:Yeah, don't, don't put the key under the rock by the front door.
Speaker:oh.
Speaker:Okay.
Speaker:Do people still do that?
Speaker:Hang on, I'll be right back.
Speaker:All right.
Speaker:Well, thank you.
Speaker:Thank you, Mike.
Speaker:Uh, like I said, I, I definitely felt like the dumb guy in the room in this one,
Speaker:but, um, uh, I think the, I think the.
Speaker:The recommendations at the end will work for pretty much a, a lot of
Speaker:these things that we talk about.
Speaker:Um, you know, uh, put those barriers in, in the way.
Speaker:And, um, and then also when you get to that, when you get, when you're
Speaker:ready to take things to the next step, it's time for an E-D-R-X-D-R tool.
Speaker:All right.
Speaker:Thank you very much, Mike.
Speaker:Anytime.
Speaker:right.
Speaker:And thanks, Prasanna.
Speaker:How you doing?
Speaker:Hello.
Speaker:All right, everyone.
Speaker:Thanks for listening.
Speaker:That is a wrap.







