home.social

#livingofftheland — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #livingofftheland, aggregated by home.social.

  1. Bitdefender Exposes Hidden Attack Surface in Trusted Tools

    Did you know that 84% of high-severity incidents involve the abuse of trusted tools, making them nearly invisible to traditional security measures? This shocking statistic highlights the alarming ease with which attackers can hide in plain sight, using legitimate tools against you.

    osintsights.com/bitdefender-ex

    #LegitimateToolAbuse #Livingofftheland #Windows11 #Overentitlement #MalwareOperations

  2. 💙💙BlueTeam today (#awkward)💙💙 Auto-exfil of system essentials via ssh. 👉Any guess👈 Ebury? Mining-kiddos? Here at THC we appreciate compact shell-based exfil-tools : #livingofftheland
    (Source here: cryptpad.disroot.org/code/#/2/)

  3. "Living off the Land" (LotL) in cybersecurity refers to threat actors using existing tools and features within a target system or network to conduct their operations, rather than deploying external or specialized malware. This approach can help threats avoid detection by blending in with legitimate activities and leveraging tools like system scripts, administrative tools, or built-in utilities to achieve their objectives.

    Over the following series of posts, I'll describe techniques for identifying threat actors engaged in Living off the Land (LotL). The posts will be broken into sections, such as, techniques for identifying threats in a Microsoft Windows environment, techniques for a Linux environment, network threats, lateral movement, and threat intelligence, among others.

    I hope you find this topic beneficial.

    I'll be providing a talk about this subject at the upcoming @GrrCON conference in Grand Rapids, MI, September 26-27, 2024, grrcon.com

    #GrrCON #LOTLattack #LivingofftheLand

  4. #China's #VoltTyphoon also tracked as #BronzeSilhouette, cyber-espionage group are known for extensively using #LivingOffTheland (#LOTL) techniques as part of their attacks on critical infrastructure organizations. They infiltrated a #criticalinfrastructure network in the #UnitedStates and remained undetected for at least five years before being discovered, according to a joint advisory from CISA, the NSA, the FBI, and partner Five Eyes agencies. bleepingcomputer.com/news/secu

  5. A morning of woodcutting this morning. A beautiful warm day and i was surprised to see that the sap is already rising so strongly that it is dripping from newly cut branches. Spring is on the way, but surely this is too early?!
    #woodcutting #selfsufficiency #livingofftheland #spring #umbria #italy
    #climatechange #today

  6. @jondrowe Have you ever tasted the difference in honey made from different flowers? Some flowers have a stronger taste than others that comes through the honey. Dandelion Jelly strikes me as like a honey with a subtly different flavour. It is very light & delicate in its difference. For instance, Bugloss flowers make a strong dark honey. (see pic for Bugloss, thistle-like flower) #trade #homemade #jellies #dandelion #writers #homestead #livingofftheland