September 3, 2020 By David Bisson 2 min read

Threat actors who misuse legitimate tools have several advantages over those who use intrusive software, notes Kaspersky Lab, a Russia-based multinational cybersecurity and anti-virus provider, in a press release. It’s more difficult for cybersecurity solutions to discern between regular user activity and malicious activity involving legitimate tools. This difficulty gives attackers more time to access an organization’s network, discover its critical assets and target sensitive information. Knowing how to prevent intrusions and stop unwanted use of legitimate tools is important for a security team’s toolkit. 

Trends in Legitimate Services Attacks

Kaspersky Lab reveals that malicious actors had misused legitimate services in 30% of cybersecurity incidents tracked by the security firm for that year in its Incident Response Analyst Report 2019.

More than one-third (38.6%) of those instances detected by the Russian security firm involved malicious actors misusing legitimate services for the purpose of executing code. PowerShell was the most widely misused service detected by Kaspersky Lab in 2019. It was directly followed by PsExec, another tool that helped to serve attackers’ execution needs.

Malicious actors didn’t misuse PsExec just for execution, however. They also seized on the tool for moving laterally throughout an organization’s network. This misuse category accounted for nearly one in five (19.6%) of misuse cases spotted by Kaspersky Lab throughout the year.

Not too far behind this type of misuse was discovery at 16.9% of instances. It was followed by credential access (10.8%), defense evasion (9.6%), impact (2.4%), collection (1.2%) and command and control (1.2%).

Cybersecurity Breaches from LotL Attacks

The misuses described above are known as Living off the Land (LotL) attacks. As noted by Dark Reading, these attacks often take the form of malicious actors targeting organizations with fileless malware that use a system’s native tools in their infection chains. Such a tactic enables the malware to hide within an organization’s legitimate processes.

Several LotL attacks made headlines in 2020. In January, Safebreach Labs revealed it had detected a new ransomware threat that misused the Encrypting File System (EFS), a feature offered by the Windows OS since 2000. Researchers found in a test that three anti-ransomware solutions had failed to protect a system against EFS-based crypto-malware. Just a couple of months later, it was discovered the authors of Astaroth had added new LotL capabilities to their trojan. The team specifically witnessed the malware abusing alternate data streams to hide its payloads and misusing the legitimate process ExtExport.exe to load those payloads.

VMware Carbon Black Threat Analysis Unit researchers detected a new attack campaign involving the TinyPOS malware family in April 2020. For that attack, malicious actors used PsExec and compromised credentials to drop the malware payload on different systems throughout the affected organization’s card data environment. With this, they could swipe customers’ credit card information.

In mid-June, ESET revealed it had uncovered a campaign that had targeted aerospace and military companies in Europe and the Middle East between September and December 2019. That operation misused OS functions and legitimate services, among employing other techniques. With them, it was able to infect targets with a malware sample named Inception.dll.

How to Prevent Attackers From Misusing Legitimate Services

Security professionals can help prevent attackers from misusing legitimate tools by coordinating with what their employees need in order to perform their jobs. If there is a native service that no one needs to use, the security team can disable it and thereby prevent malicious actors from using it to gain access to the network. To account for the services that are needed by the organization, security professionals should monitor user and network behavior and correlate these observations with known threat indicators.

More from

How to craft a comprehensive data cleanliness policy

3 min read - Practicing good data hygiene is critical for today’s businesses. With everything from operational efficiency to cybersecurity readiness relying on the integrity of stored data, having confidence in your organization’s data cleanliness policy is essential.But what does this involve, and how can you ensure your data cleanliness policy checks the right boxes? Luckily, there are practical steps you can follow to ensure data accuracy while mitigating the security and compliance risks that come with poor data hygiene.Understanding the 6 dimensions of…

2024 roundup: Top data breach stories and industry trends

3 min read - With 2025 on the horizon, it’s important to reflect on the developments and various setbacks that happened in cybersecurity this past year. While there have been many improvements in security technologies and growing awareness of emerging cybersecurity threats, 2024 was also a hard reminder that the ongoing fight against cyber criminals is far from over.We've summarized this past year's top five data breach stories and industry trends, with key takeaways from each that organizations should note going into the following…

Black Friday chaos: The return of Gozi malware

4 min read - On November 29th, 2024, Black Friday, shoppers flooded online stores to grab the best deals of the year. But while consumers were busy filling their carts, cyber criminals were also seizing the opportunity to exploit the shopping frenzy. Our system detected a significant surge in Gozi malware activity, targeting financial institutions across North America. The Black Friday connection Black Friday creates an ideal environment for cyber criminals to thrive. The combination of skyrocketing transaction volumes, a surge in online activity…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today