Which fileless malware operates in memory and can steal keystrokes and credentials?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

Which fileless malware operates in memory and can steal keystrokes and credentials?

Explanation:
Fileless malware stays in memory and avoids writing a persistent payload to disk, using RAM-resident techniques to perform its actions and evade detection. Astaroth is a well-known in-memory credential stealer that operates without dropping a full, persistent file to disk. It targets credentials and sensitive data from browsers and other applications, and its memory-resident approach often includes keylogging or capturing keystrokes as part of stealing credentials, making it a strong match for this description. The other options are more typically associated with traditional disk-based payloads or broader RAT/credit-stealing capabilities, rather than being defined by a memory-resident, fileless approach.

Fileless malware stays in memory and avoids writing a persistent payload to disk, using RAM-resident techniques to perform its actions and evade detection. Astaroth is a well-known in-memory credential stealer that operates without dropping a full, persistent file to disk. It targets credentials and sensitive data from browsers and other applications, and its memory-resident approach often includes keylogging or capturing keystrokes as part of stealing credentials, making it a strong match for this description. The other options are more typically associated with traditional disk-based payloads or broader RAT/credit-stealing capabilities, rather than being defined by a memory-resident, fileless approach.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy