• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
lolbas in the wild: 11 living off the land binaries used for malicious

LOLBAS in the Wild: 11 Living-Off-The-Land Binaries Used for Malicious Purposes

You are here: Home / General Cyber Security News / LOLBAS in the Wild: 11 Living-Off-The-Land Binaries Used for Malicious Purposes
August 8, 2023

Cybersecurity scientists have uncovered a set of 11 dwelling-off-the-land binaries-and-scripts (LOLBAS) that could be maliciously abused by danger actors to carry out put up-exploitation activities.

“LOLBAS is an attack technique that utilizes binaries and scripts that are now section of the method for destructive reasons,” Pentera security researcher Nir Chako claimed. “This would make it challenging for security groups to distinguish concerning reputable and malicious routines, considering that they are all carried out by reliable technique utilities.”

To that end, the Israeli cybersecurity organization mentioned it uncovered 9 LOLBAS downloaders and three executors that could empower adversaries to down load and execute “additional robust malware” on infected hosts.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


This features: MsoHtmEd.exe, Mspub.exe, ProtocolHandler.exe, ConfigSecurityPolicy.exe, InstallUtil.exe, Mshta.exe, Presentationhost.exe, Outlook.exe, MSAccess.exe, scp.exe, and sftp.exe.

Cybersecurity

“In a entire attack chain, a hacker will use a LOLBAS downloader to down load extra sturdy malware,” Chako claimed. “Then, they will try to execute it in a stealthy way. LOLBAS executors make it possible for attackers to execute their destructive applications as aspect of a genuine wanting method tree on the method.”

LOLBAS

That explained, Pentera famous that attackers could also use other executables from software outdoors of all those linked to Microsoft to reach comparable aims.

The findings come as Vectra disclosed a probable new attack vector that leverages Microsoft Entra ID (formerly Azure Active Directory) cross-tenant synchronization (CTS) aspect to facilitate lateral motion to other tenants assuming a privileged identification has currently been compromised in the cloud natural environment.

Binaries and Scripts

“An attacker working in a compromised natural environment can exploit an present CTS configuration tenant to go laterally from one tenant to a further related tenant,” the company stated. Alternatively, “an attacker operating in a compromised tenant can deploy a rogue Cross Tenant Accessibility configuration to preserve persistent entry.”

Found this post appealing? Observe us on Twitter  and LinkedIn to read through additional exclusive content material we article.


Some sections of this posting are sourced from:
thehackernews.com

Previous Post: «new malware campaign targets inexperienced cyber criminals with openbullet configs New Malware Campaign Targets Inexperienced Cyber Criminals with OpenBullet Configs
Next Post: New Yashma Ransomware Variant Targets Multiple English-Speaking Countries new yashma ransomware variant targets multiple english speaking countries»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New FjordPhantom Android Malware Targets Banking Apps in Southeast Asia
  • Qakbot Takedown Aftermath: Mitigations and Protecting Against Future Threats
  • Chinese Hackers Using SugarGh0st RAT to Target South Korea and Uzbekistan
  • Discover How Gcore Thwarted Powerful 1.1Tbps and 1.6Tbps DDoS Attacks
  • WhatsApp’s New Secret Code Feature Lets Users Protect Private Chats with Password
  • U.S. Treasury Sanctions North Korean Kimsuky Hackers and 8 Foreign Agents
  • Zyxel Releases Patches to Fix 15 Flaws in NAS, Firewall, and AP Devices
  • Zero-Day Alert: Apple Rolls Out iOS, macOS, and Safari Patches for 2 Actively Exploited Flaws
  • Google Unveils RETVec – Gmail’s New Defense Against Spam and Malicious Emails
  • North Korea’s Lazarus Group Rakes in $3 Billion from Cryptocurrency Hacks

Copyright © TheCyberSecurity.News, All Rights Reserved.