What are script-based attacks and what can be done to prevent them? - Help Net Security

What are script-based attacks and what can be done to prevent them? - Help Net Security

Attackers always seek out new ways to evade detection. As most endpoint security products handle file-based attacks relatively well, scripts are an excellent way for attackers to avoid making changes to a disk, thus bypassing the threat detection capabilities of most products. In today’s threat landscape, scripts provide initial access, enable evasion, and facilitate lateral movements post-infection.



Attackers will use scripts directly on the machine or embed them in Office documents and PDFs sent to the victim as email attachments. This article provides an overview of the current script threat landscape as well as the most common script attacks and methods.


Script-based cyber-attacks


Script-based cyber-attacks gained popularity in 2017 and their prevalence has grown by over 100%. Nation-state and cybercrime groups adopted the use of scripts and fileless malware in this same timeframe. Today, script-based attacks account for 40% of all cyberattacks, according to ..

Support the originator by clicking the read the rest link below.