8 Legit Tools and Utilities That Cybercriminals Commonly Misuse
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
July 18, 2019
Already have an account?
Cybercriminals have long used legitimate management and administration tools to break into enterprise networks, move laterally within them, and maintain persistence.
Lately, though, use of these so-called living-off-the-land tactics has increased substantially.
Positive Technologies recently analyzed the tools that 29 advanced persistent threat groups are currently using in their campaigns worldwide. Its study shows that more than half of them leverage legitimate, publicly available penetration testing and systems administration tools to develop their attacks after gaining an initial foothold on a network.
The reason? Such tools allow attackers to hide their activities in a sea of legitimate traffic. "Threat actors increasingly leverage dual-use tools or tools that are already preinstalled on targeted systems to carry out cyberattacks," said Fortinet in a recent report.
This makes it harder for defenders to spot malicious activity and makes attack attribution much more difficult. "Unfortunately, adversaries can use a wide range of legitimate tools to accomplish their goals and hide in plain sight," Fortinet said.
Here, according to security experts, are eight of the mostly commonly abused legitimate utilities and tools.
About the Author
You May Also Like