Which fileless malware operates in memory and can steal keystrokes and credentials?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which fileless malware operates in memory and can steal keystrokes and credentials?

Explanation:
Fileless malware stays in memory and avoids writing a persistent payload to disk, using RAM-resident techniques to perform its actions and evade detection. Astaroth is a well-known in-memory credential stealer that operates without dropping a full, persistent file to disk. It targets credentials and sensitive data from browsers and other applications, and its memory-resident approach often includes keylogging or capturing keystrokes as part of stealing credentials, making it a strong match for this description. The other options are more typically associated with traditional disk-based payloads or broader RAT/credit-stealing capabilities, rather than being defined by a memory-resident, fileless approach.

Fileless malware stays in memory and avoids writing a persistent payload to disk, using RAM-resident techniques to perform its actions and evade detection. Astaroth is a well-known in-memory credential stealer that operates without dropping a full, persistent file to disk. It targets credentials and sensitive data from browsers and other applications, and its memory-resident approach often includes keylogging or capturing keystrokes as part of stealing credentials, making it a strong match for this description. The other options are more typically associated with traditional disk-based payloads or broader RAT/credit-stealing capabilities, rather than being defined by a memory-resident, fileless approach.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy