Jump to content

Draft:Living-off-the-Land attack

From Wikipedia, the free encyclopedia
  • Comment: A patchwork of minimal paraphrasing from the sources. In addition to the copyvio/plagiarism problem, it also creates some rather awkward wording such as "This in turn makes it quite confusing for the defenders on the network to segregate between an authentic user’s activity and the same user engaging in a malicious activity", cf the source's phrasing "this makes it difficult for network defenders to discern legitimate behavior from malicious behavior [...]" (page 2 in the source) bonadea contributions talk 11:46, 14 September 2024 (UTC)
  • Comment: This crosses between WP:NOTHOWTO and WP:NOTESSAY. In addition, most of the sources are not reliable (blogs, WP:FORBESCON, commercial sites, conference proceedings, etc.). If resubmitted without substantial improvement with both the content and sourcing, the draft may be rejected meaning it will not longer be considered. S0091 (talk) 21:56, 9 September 2024 (UTC)
  • Comment: Still contains WP:NPOV and tone issues, with some brand new questionable sentences. "By combining these approaches, organizations can strengthen their defense against LOTL attacks and reduce the likelihood of undetected system compromises.", which independent, reliable source asserts this? Utopes (talk / cont) 06:34, 9 September 2024 (UTC)
  • Comment: This currently reads like a "PSA announcement" on avoiding "living off the land" attacks, when it should be written like an encyclopedia article and fully described like so. The sourcing is also insufficient, which independent reliable source states that: "These actions taken together enhance the overall capability of the organization to defend and to recover from LOTL threats."? Utopes (talk / cont) 21:25, 8 September 2024 (UTC)


Living-Off-the-Land (LOTL) refers to a fileless malware cyberattack technique whereby the threat actors utilize the available system tools and built-in system features to compromise the networks while remaining undetected [1]. Unlike traditional types of cyber assaults with a malware infection, in this case, the attacker does not import external malware into the systems [2]. Instead, cybercriminals use the inbuilt utilities and administrative options available making it hard even for the traditional security features to pick them out.

Attack tools

[edit]

Several legitimate system utilities are commonly employed in LOTL attacks, and these tools, which are integral to operating system functionality or administrative processes, can be misused to execute malicious actions. Some of the most frequently exploited software include [1]:

Detection and prevention techniques

[edit]

Advanced monitoring techniques, such as behavior analysis and machine learning are used to identify unusual system activity that may indicate an ongoing LOTL attack[3]

Several strategies for prevention include:

  • Implement Process Detection Rules: Apply detection rules to identify suspicious processes such as PowerShell and Command Prompt triggered by Microsoft Office applications.[2]
  • Leverage Advanced Tools: Engage in endpoint monitoring and conduct behavioral analytics to respond to suspicious acts.[3]
  • Use User & Entity Behavioral Analytics: Build or acquire automation (such as machine learning models) to continually review all logs to compare current activities against established behavioral baselines and alert on specified anomalies.[2]
  • Least Privilege Principle: Grant users only the minimum privileges necessary to perform their job duties [3].

References

[edit]
  1. ^ a b F. Barr-Smith, X. Ugarte-Pedrero, M. Graziano, R. Spolaor and I. Martinovic, "Survivalism: Systematic Analysis of Windows Malware Living-Off-The-Land," 2021 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2021, pp. 1557-1574, doi: 10.1109/SP40001.2021.00047. keywords: {Privacy;Systematics;Malware;Security;Detection algorithms;Malware;Advanced-Persistent-Threat;Security;Windows;Operating-Systems},
  2. ^ a b c Sudhakar; Kumar, Sushil (2020-01-14). "An emerging threat Fileless malware: a survey and research challenges". Cybersecurity. 3 (1): 1. doi:10.1186/s42400-019-0043-x. ISSN 2523-3246.
  3. ^ a b c "Identifying and Mitigating Living Off the Land Techniques | CISA". www.cisa.gov. 2024-02-07. Retrieved 2024-09-09.