September 3, 2020 By David Bisson 2 min read

Threat actors who misuse legitimate tools have several advantages over those who use intrusive software, notes Kaspersky Lab, a Russia-based multinational cybersecurity and anti-virus provider, in a press release. It’s more difficult for cybersecurity solutions to discern between regular user activity and malicious activity involving legitimate tools. This difficulty gives attackers more time to access an organization’s network, discover its critical assets and target sensitive information. Knowing how to prevent intrusions and stop unwanted use of legitimate tools is important for a security team’s toolkit. 

Trends in Legitimate Services Attacks

Kaspersky Lab reveals that malicious actors had misused legitimate services in 30% of cybersecurity incidents tracked by the security firm for that year in its Incident Response Analyst Report 2019.

More than one-third (38.6%) of those instances detected by the Russian security firm involved malicious actors misusing legitimate services for the purpose of executing code. PowerShell was the most widely misused service detected by Kaspersky Lab in 2019. It was directly followed by PsExec, another tool that helped to serve attackers’ execution needs.

Malicious actors didn’t misuse PsExec just for execution, however. They also seized on the tool for moving laterally throughout an organization’s network. This misuse category accounted for nearly one in five (19.6%) of misuse cases spotted by Kaspersky Lab throughout the year.

Not too far behind this type of misuse was discovery at 16.9% of instances. It was followed by credential access (10.8%), defense evasion (9.6%), impact (2.4%), collection (1.2%) and command and control (1.2%).

Cybersecurity Breaches from LotL Attacks

The misuses described above are known as Living off the Land (LotL) attacks. As noted by Dark Reading, these attacks often take the form of malicious actors targeting organizations with fileless malware that use a system’s native tools in their infection chains. Such a tactic enables the malware to hide within an organization’s legitimate processes.

Several LotL attacks made headlines in 2020. In January, Safebreach Labs revealed it had detected a new ransomware threat that misused the Encrypting File System (EFS), a feature offered by the Windows OS since 2000. Researchers found in a test that three anti-ransomware solutions had failed to protect a system against EFS-based crypto-malware. Just a couple of months later, it was discovered the authors of Astaroth had added new LotL capabilities to their trojan. The team specifically witnessed the malware abusing alternate data streams to hide its payloads and misusing the legitimate process ExtExport.exe to load those payloads.

VMware Carbon Black Threat Analysis Unit researchers detected a new attack campaign involving the TinyPOS malware family in April 2020. For that attack, malicious actors used PsExec and compromised credentials to drop the malware payload on different systems throughout the affected organization’s card data environment. With this, they could swipe customers’ credit card information.

In mid-June, ESET revealed it had uncovered a campaign that had targeted aerospace and military companies in Europe and the Middle East between September and December 2019. That operation misused OS functions and legitimate services, among employing other techniques. With them, it was able to infect targets with a malware sample named Inception.dll.

How to Prevent Attackers From Misusing Legitimate Services

Security professionals can help prevent attackers from misusing legitimate tools by coordinating with what their employees need in order to perform their jobs. If there is a native service that no one needs to use, the security team can disable it and thereby prevent malicious actors from using it to gain access to the network. To account for the services that are needed by the organization, security professionals should monitor user and network behavior and correlate these observations with known threat indicators.

More from

Are successful deepfake scams more common than we realize?

4 min read - Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of fraud.Earlier this year, a finance worker found themselves talking on a video meeting with someone who looked and sounded just like their CFO. After the…

How cyberattacks on grocery stores could threaten food security

4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.Because the attack affected many digital systems, some stores were not able to accept credit/debit cards, while others had to shut…

Taking the fight to the enemy: Cyber persistence strategy gains momentum

4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.The momentum behind this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today