8 Legit Tools and Utilities That Cybercriminals Commonly Misuse8 Legit Tools and Utilities That Cybercriminals Commonly Misuse
Threat actors are increasingly 'living off the land,' using publicly available management and administration tools to conceal malicious activity.
July 18, 2019
Cybercriminals have long used legitimate management and administration tools to break into enterprise networks, move laterally within them, and maintain persistence.
Lately, though, use of these so-called living-off-the-land tactics has increased substantially.
Positive Technologies recently analyzed the tools that 29 advanced persistent threat groups are currently using in their campaigns worldwide. Its study shows that more than half of them leverage legitimate, publicly available penetration testing and systems administration tools to develop their attacks after gaining an initial foothold on a network.
The reason? Such tools allow attackers to hide their activities in a sea of legitimate traffic. "Threat actors increasingly leverage dual-use tools or tools that are already preinstalled on targeted systems to carry out cyberattacks," said Fortinet in a recent report.
This makes it harder for defenders to spot malicious activity and makes attack attribution much more difficult. "Unfortunately, adversaries can use a wide range of legitimate tools to accomplish their goals and hide in plain sight," Fortinet said.
Here, according to security experts, are eight of the mostly commonly abused legitimate utilities and tools.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper