Topic: living off land

  • Stop Hackers Exploiting LOTL Attacks

    Stop Hackers Exploiting LOTL Attacks

    Attackers increasingly use "Living off the Land" (LOTL) techniques, leveraging legitimate system tools like PowerShell to blend malicious activities with normal operations, making detection difficult. Bitdefender's PHASR technology counters LOTL by learning individual user and endpoint behaviors ...

    Read More »
  • Windows App-V Scripts Bypass Enterprise Defenses with Infostealer

    Windows App-V Scripts Bypass Enterprise Defenses with Infostealer

    A sophisticated malware campaign bypasses enterprise security by tricking users into running a command that abuses a legitimate Microsoft script (`SyncAppvPublishingServer.vbs`) to stealthily execute PowerShell, targeting high-value corporate systems. The attack relies on specific Windows environ...

    Read More »
  • Akira Ransomware Hijacks Victim's Remote Management Tool

    Akira Ransomware Hijacks Victim's Remote Management Tool

    Hackers used the trusted Datto RMM tool and a Living Off The Land strategy to deploy Akira ransomware, disguising their actions as normal IT operations to avoid detection. The attack was halted by Barracuda Managed XDR, which detected the encryption activity and immediately isolated the compromis...

    Read More »
  • Stop Malicious PowerShell with New ExtraHop Security Tools

    Stop Malicious PowerShell with New ExtraHop Security Tools

    ExtraHop has introduced new security enhancements to detect and neutralize malicious PowerShell activity, which attackers use to operate stealthily within networks by blending in with normal administrative tasks. The platform integrates detection mechanisms that identify specific malicious behavi...

    Read More »
  • Beware: Fake Booking.com Emails and BSODs Target Hotels

    Beware: Fake Booking.com Emails and BSODs Target Hotels

    A sophisticated phishing campaign targets the European hospitality industry using convincing fake Booking.com emails to deliver the DCRat malware, which steals data and provides attackers with persistent remote access. The attack employs advanced social engineering, including a fake Windows error...

    Read More »
  • Beware: Fake Windows Update Screens Spread ClickFix Malware

    Beware: Fake Windows Update Screens Spread ClickFix Malware

    A deceptive malware campaign uses a fake Windows Update screen to trick users into manually executing malicious commands, leading to the installation of information-stealing software. The attack employs advanced techniques like steganography to hide malicious code in PNG images and operates in me...

    Read More »
  • Unpatched Cisco Firewalls, Red Hat's GitLab Breached by Hackers

    Unpatched Cisco Firewalls, Red Hat's GitLab Breached by Hackers

    Cybersecurity threats are intensifying due to unpatched devices and supply chain compromises, as seen in attacks on Cisco firewalls and Red Hat, highlighting the need for timely updates and third-party risk management. Global infrastructure, including undersea cables, is increasingly vulnerable t...

    Read More »