living off the land
Emulating the Petrifying Medusa Ransomware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by Medusa ransomware since the beginning of its activities in June 2021. Medusa is predominantly propagated through the exploitation of ...

Event Logging Key to Detecting LOTL Attacks, Security Agencies Say
A report by CISA, the FBI, the NSA, and international agencies lay out the argument that event logging tools help enterprises better detect attacks that rely on LOTL techniques used by threat ...
Emulating Sandworm’s Prestige Ransomware
AttackIQ has released a new attack graph that emulates the behaviors exhibited by Prestige ransomware since the beginning of its activities in October 2022. Prestige has been observed targeting organizations in the ...

A Major Industrial Cybersecurity Threat: Living off the Land Attacks
In “Living off the Land attacks,” adversaries use USB devices to infiltrate industrial control systems. Cyberthreats from silent residency attacks put critical infrastructure facilities at risk ...
Introduction to Living Off the Land (LotL) Attacks
Living off the Land (LotL) attacks represent a sophisticated cyber threat strategy where attackers use legitimate tools and processes, known as LOLBins (Living Off the Land Binaries), to execute malicious activities. This ...
The Shape Shifting Cameleon: QakBot
QakBot, also recognized as Qbot, Quackbot, Pinkslipbot, and TA570, has etched its name among other cyber threats, leaving a trail of thousands of malware infections globally. Dive in as we explore QakBot’s ...

Cyber Security DE:CODED – Security opportunities for Managed Service Providers
“Every SMB is an expert in something. A passion. It’s probably not anti-virus…” Show notes for series 2, episode 7 Small business and Managed Service Provider special! In June 2022*, we set ...

Defend Your IT Environment from Living-Off-the-Land (LOL) Techniques
As cyberattacks increase in frequency and sophistication, it is vital for organizations to defend their environments and be prepared for malicious actors inside their networks. Indeed, much as a parasite feeds off ...

Congratulations, You’ve Won a Meterpreter Shell
Posted by Josh Stroschein, Ratnesh Pandey and Alex Holland. For an attack to succeed undetected, attackers need to limit the creation of file and network artifacts by their malware. In this post, ...

Separ Infostealer Using “Living off the Land” Tactics to Target Businesses
The Separ infostealer is using what’s known as “Living off the Land” tactics to target businesses as part of an ongoing attack campaign. Digital security company Deep Instinct detected the campaign and ...