Cybercriminals have long used legitimate management and administration tools to break into enterprise networks, move laterally within them, and maintain persistence.
Lately, though, use of these so-called living-off-the-land tactics has increased substantially.
Positive Technologies recently analyzed the tools that 29 advanced persistent threat groups are currently using in their campaigns worldwide. Its study shows that more than half of them leverage legitimate, publicly available penetration testing and systems administration tools to develop their attacks after gaining an initial foothold on a network.
The reason? Such tools allow attackers to hide their activities in a sea of legitimate traffic. “Threat actors increasingly leverage dual-use tools or tools that are already preinstalled on targeted systems to carry out cyberattacks,” said Fortinet in a recent report.
This makes it harder for defenders to spot malicious activity and makes attack attribution much more difficult. “Unfortunately, adversaries can use a wide range of legitimate tools to accomplish their goals and hide in plain sight,” Fortinet said.
Here, according to security experts, are eight of the mostly commonly abused legitimate utilities and tools.
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio