Skip Navigation
BlackBerry Blog

A Uniquely Intelligent Approach to Combating Fileless Attacks

What Exactly is a Fileless Attack?

Fileless attacks are threats existing and operating exclusively in volatile memory. The term has evolved over the years to include threats that maliciously utilize legitimate system resources without writing new files on disk. Today, any cyberattack using fileless elements within the attack chain may also be described as fileless.

By leveraging legitimate system resources for malicious purposes, fileless malware effectively hides from the vast majority of traditional threat detection methods.

These kinds of attacks can be recognized by the following traits:

  • Malware is memory resident instead of residing on disk
  • Script-intensive malware uses Jscript/JAVAScript to launch initial infection
  • Malware exploits resources like PowerShell and WMI to conduct activities
  • Malware achieves persistence through modification of the system registry

Providing a Frontline Against Fileless Malware

Prevention is possible. Combating fileless attacks requires a departure from traditional, file-based countermeasures.

Sophisticated threats require advanced solutions, which is why BlackBerry® Cylance® uses memory defense, script and macro control, and our Context Analysis Engine (CAE) to keep your organization safe. We also invest heavily in artificial intelligence (AI) and predictive security technology. Our AI-driven threat prevention and response solutions protect you from threats, no matter how they operate.

For a better understanding of fileless threats and the ways you can prevent them, visit

By accessing these resources, you will learn:

  • How to recognize a fileless attack
  • Specific traits of fileless attacks
  • How to combat fileless attacks

To find out more about fileless attacks and how to stop them, read more HERE.

The Cylance Team

About The Cylance Team

Our mission: to protect every computer, user, and thing under the sun.

Cylance’s mission is to protect every computer, user, and thing under the sun. That's why we offer a variety of great tools and resources to help you make better-informed security decisions.