Blue Tuesday: Detecting & Mitigating LOTL (Living off the Land) Attacks

Overview
Why attackers love LOTL:
Detection
PowerShell Abuse Detection
WMI Activity
Signed Binary Proxy Execution (T1218)
Prevention & Mitigation
Real World Examples
FIN7 and mshta.exe
APT29 & certutil.exe
Cobalt Group & rundll32.exe
CVEs & Breaches
MITRE ATT&CK & D3FEND Mapping

Tools for Blue Teams
Resources:
Conclusion
Last updated
Was this helpful?

