More

    Emerging Cyber Threat: Malware Now Targeting System Memory Instead of Disk Storage

    Cyber criminals have long relied on traditional methods to distribute malware, typically placing malicious payloads on system storage devices like hard drives or solid-state drives (SSDs). However, recent findings from Morphisec Threat Labs reveal an alarming new trend in the way malware is being deployed. Instead of utilizing conventional disk-based distribution, attackers are now targeting a more elusive and volatile part of the system: memory.

    This shift in strategy allows cybercriminals to keep their attacks under the radar, avoiding detection by traditional security measures. Malware stored in memory can evade security software that scans disk storage for threats, making it a much more stealthy and effective form of cyberattack.

    In their recent investigation, cybersecurity experts from Morphisec analyzed a breach at a real estate firm and uncovered a sophisticated malware campaign that used this exact approach. The malware in question, identified as Tuoni C2C, remained dormant in the network for months, unnoticed by security systems, before eventually triggering malicious activities.

    Interestingly, while the infection was propagated through a phishing campaign, the phishing itself wasn’t the main attack vector. Instead, the hackers employed advanced techniques such as steganography and artificial intelligence (AI) to silently drop malware into the system’s memory.

    The Role of Steganography and AI in Modern Malware

    One of the most striking aspects of this new tactic is the use of Steganography, a technique where seemingly innocuous files—like bitmap (BMP) images—are manipulated to conceal malicious payloads. These infected images are then used to inject malware into system memory, where it can execute silently.

    The sophistication of the malware doesn’t end with its delivery. Once in memory, the payload is able to alter its code at runtime—a technique designed to make detection even harder. By modifying its behavior as it runs, the malware avoids triggering traditional behavioral alerts that would usually be caught by anti-malware software. This dynamic adaptability allows it to remain undetected for long periods, sometimes even months.

    The malware’s primary goal, according to Morphisec’s research, is to silently gather sensitive information, such as user credentials. By sitting quietly in the background, the malware can stealthily harvest data, waiting for the right moment to escalate its actions. Only when the attackers decide to trigger a more destructive payload does the malware spring into action, potentially causing significant damage to the system or network.

    Why Memory-Based Malware is Harder to Detect

    The key advantage of targeting memory over disk storage lies in its volatility. While files on disks are permanent until deleted or overwritten, memory is temporary and constantly changing. This makes it more difficult for traditional security tools, which are designed to scan file systems for known threats, to detect and neutralize memory-based attacks.

    Furthermore, the fact that memory is actively used by the system to run processes means that malware can operate in the background without raising suspicion. Anti-malware software often focuses on scanning static files and signatures, and as a result, memory-resident threats can go unnoticed for extended periods of time.

    The Growing Threat of Advanced Malware Campaigns

    As cybercriminals continue to develop more sophisticated methods, organizations must adapt their security strategies to defend against these evolving threats. Memory-based attacks, combined with tactics like steganography and AI-driven evasive techniques, are becoming increasingly common, making it clear that traditional cybersecurity measures are no longer sufficient.

    Organizations need to invest in advanced threat detection systems that can monitor not just disk storage, but also memory and runtime behavior. In addition, heightened awareness of social engineering tactics, like phishing, and the implementation of strong authentication mechanisms can help mitigate the risks associated with these stealthy malware campaigns.

    Conclusion

    The latest findings from Morphisec Threat Labs highlight a dangerous trend in the evolution of malware distribution. By shifting their focus from disk-based payloads to memory-resident threats, cybercriminals are finding new ways to bypass traditional defenses and operate with greater stealth. As this type of attack continues to gain traction, it’s crucial for businesses to enhance their security practices, adopt more sophisticated detection tools, and stay vigilant against the evolving landscape of cyber threats.

    Join our LinkedIn group Information Security Community! 

    Latest articles

    Related articles