Living Off The Land
By |Published On: September 19th, 2024|4 min read|Categories: Dark Web, Data Exfiltration, Ransomware|

In recent years, cybercriminals have increasingly adopted a tactic known as “living off the land” (LotL) to carry out devastating ransomware attacks. This approach involves using legitimate system administration tools and processes to evade detection and execute malicious activities. By leveraging trusted software already present on target systems, attackers can blend in with normal operations and bypass many traditional security controls.

What Are Living Off the Land Attacks?

LotL attacks take their name from the survival technique of foraging and using resources available in the natural environment. In cybersecurity, it refers to threat actors utilizing built-in operating system features, commonly used utilities, and other authorized software to compromise systems and networks.

Living Off The Land Techniques

Image: Cybercriminals sharing tutorials on LotL techniques

Some examples of legitimate tools frequently exploited in LotL attacks include:

  • PowerShell
  • Windows Management Instrumentation (WMI)
  • PsExec
  • Remote Desktop Protocol (RDP)
  • Task Scheduler
  • Windows Scripting Host (WSH)
  • Sysinternals tools
  • Command-line interfaces

By leveraging these trusted utilities, attackers can perform reconnaissance, move laterally within networks, escalate privileges, exfiltrate data, and deploy ransomware payloads – all while flying under the radar of many security solutions.

Why Are Living Off the Land Tactics Effective?

LotL techniques have several benefits for ransomware operators:

Most antivirus and endpoint detection systems can recognize known malware signatures or suspicious binaries, but LotL attacks with native tools bypass these defenses. Because attackers are not introducing new malicious executables, there are fewer obvious indicators of compromise (IoCs) for analysts to find.

Many system administration tools are privileged so attackers can harvest login credentials and escalate permissions. Malicious activities can exist that are disguised as system tasks allowing long term, stealthy access.

Attackers also no longer need to develop and deploy custom malware – cutting complexity and potential points of failure. All these factors make LotL tactics appealing for cybercriminals.

Which Ransomware Groups Use Living Off the Land?

To give you some examples, here are two examples of ransomware groups that have used LotL techniques:

Vice Society

Vice Society conducts double extortion attacks on the education and health sectors. One incident saw Vice Society post 500GB of stolen data on the dark web for the Los Angeles Unified School District (LAUSD). The group frequently uses PowerShell scripts and Go-backdoor DLLs to avoid detection by common EDR and security tools. They also deploy ransomware variants including HelloKitty for Linux hosts and Zeppelin for Windows hosts through tools like PsExec.

LockBit

LockBit is a notorious ransomware group that uses LotL techniques extensively. In one real incident, with a ThreatDown MDR client, LockBit attackers used the Nltest command to map out the network topology and find possible lateral movement paths. They then started remote processes using Windows Management Instrumentation Command-line (WMIC) to spread ransomware. LockBit also used Rundll32, a legitimate Windows tool, to execute malicious code embedded in DLL files to avoid detection.

How Can Living Off the Land Be Mitigated?

To prevent LotL attacks, organizations can employ two main strategies:

First, apply the principle of least privilege – grant users and systems only the minimal access to perform their roles. This limits attackers to exploit elevated privileges.

Continually reviewing user accounts and system processes to ensure that administrative privileges are granted only when absolutely necessary may also help enforce this principle.

Secondly, implement anti data exfiltration (ADX) measures. Monitoring of network movements can detect irregularities or large transfers of data to external locations that may indicate data exfiltration attempts.

For this purpose, BlackFog is an ideal candidate and provides full ADX capabilities to organizations committed to data protection and prevention-based security policies. Keeping unauthorized data off your network lowers risk while improving compliance and audit outcomes.

If you’re interested, book a free ransomware assessment today to see how we can help strengthen your organization’s security.

Share This Story, Choose Your Platform!

Related Posts

  • How ADX is integrated into the Enterprise

TAG Blog Series 2 – How ADX is Integrated into the Enterprise

September 16th, 2024|

Integrating Anti Data Exfiltration (ADX) solutions into an enterprise is crucial for effective cybersecurity. This article examines how BlackFog's commercial ADX solution enhances existing detection and response technologies by focusing on prevention and the shift-left paradigm. Using ransomware threats as an example, we illustrate how ADX mitigates device risks in typical business environments. Additionally, we explore how ADX supports the evolving needs of modern managed security service providers, ensuring comprehensive and proactive security measures.

  • Manufacturing Industry Surge 1

Manufacturing Industry Faces Surge in Ransomware Attacks in 2024

September 6th, 2024|

Ransomware attacks on the manufacturing industry are rising, with notable cases at MKS Instruments, Brunswick Corporation, Simpson Manufacturing, and The Clorox Company. Learn about the financial and operational impacts and why manufacturers are prime targets for cybercriminals.

  • TAG How ADX Supports and Implements Policy

TAG Blog Series 1 – How ADX Supports and Implements Policy

September 2nd, 2024|

Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing effective ADX deployment policies, with a focus on aligning them with business objectives and threat perceptions. Highlighting BlackFog's ADX solution, it explores proactive strategies to prevent data exfiltration, offering valuable insights for practitioners aiming to enhance their security posture.