Security

Trusted Developer Tools Are Now Malware Delivery Systems: ThreatDown’s Marco Giuliani on the Deno Runtime Attack

0

Enterprise security teams have spent years hardening perimeters, deploying EDR platforms, and training developers on safe coding practices. But a new class of attack doesn’t need a malicious file, a vulnerable CVE, or even a phishing link to a shady domain. It needs only one thing: a developer who trusts their own tools. ThreatDown, formerly the corporate business unit of Malwarebytes, documented the first known case of threat actors weaponizing Deno — a secure-by-default JavaScript runtime — to deliver a fully fileless malware payload. The attack chain never touched the disk. Classic antivirus saw nothing. And it was only caught because an MDR team was watching behavioral patterns 24/7.

This is not an edge case. It is a preview of how every trusted runtime, framework, and developer tool in your stack can be turned into a covert delivery mechanism — and why the security industry’s reliance on single-layer, signature-based detection is now a liability.

The Guest: Marco Giuliani, Vice President & Head of Research at ThreatDown (Malwarebytes)

Key Takeaways

  • ThreatDown’s MDR team identified the first documented case of Deno being weaponized for fileless malware delivery — the payload was hidden in a JPEG and executed entirely in memory via reflective PE loading.
  • ClickFix social engineering — tricking users into copy-pasting a PowerShell command to “fix” a fake system error — was the initial infection vector, requiring no file download from the victim.
  • Signature-based and single-layer EDR detection is insufficient against living-off-the-land attacks; defenders need behavioral telemetry correlated across network, process, and in-memory activity.
  • AI agentic workflows introduce a new attack surface: malicious skill files uploaded to open repositories, including ones with obfuscated prompt-injection instructions written in foreign languages buried at the end of otherwise legitimate-looking files.
  • The only reliable defense posture is continuous profiling — know your endpoints, know your network, know what normal looks like, so anomalous C2 connections and memory injection patterns can be caught in real time.

***

Read Full Transcript & Technical Deep Dive

AI Agents Are Breaking Enterprise Identity — Keycard’s Ian Livingstone on the Fix | TFiR

Previous article