“Fileless” Ransomware: How It Works & How To Stop It

  • Date 06 Jun 2018

“Fileless” Ransomware: How It Works & How To Stop It

06 Jun 2018, 10:40 - 11:05

Tech Talks

The rising use of super stealthy “fileless” ransomware to evade detection and complicate mitigation is a new and notable development in the ongoing game of cat-and-mouse between malware authors and security systems. This session will provide an end-to-end look at fileless ransomware attacks, and show how they fit into the current ransomware landscape. Using real-world examples, it will cover the range of techniques in use, common attack vectors, and strategies for defence for IT and security managers.

Learning Outcomes

  1. Understand why file-less methods are becoming increasingly coupled with ransomware, and the implications for IT security
  2. Understand the main techniques used in file-less malware
  3. Get to know the end-to-end attack chain of file-less ransomware
  4. Learn about the challenges in combating file-less malware
  5. Learn which detection methods are effective - and which ones are not


  • Arna Magnusardottir


    Senior Malware Researcher


    Arna Magnusardottir is a Senior Malware Researcher at Cyren. She received her diploma in Computer Science from Reykjavík University, and since...


We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.