•   sales@dolos.africa
  • +27 21 683 3899
DolosDolosDolosDolos
  • Home
  • Solutions
    • Endpoint Security
      • Endpoint Protection
      • Endpoint Detection & Response
      • Add-on Modules
      • DNS Protection
    • Advanced Endpoint Security
      • Advanced EDR & EPDR
      • Threat Hunting Platform
      • Add-on Modules
      • MDR
    • XDR – Unified Security
    • Network Security
    • Multi-Factor Authentication
    • Secure Wi-Fi
    • Document Security
    • RMM Solutions
    • Cyber Assessment
  • Partners
  • News
    • Blog
    • Press Office
  • Support
  • About Us
  • Contact

Navigating Living-off-the-Land Attacks: Understanding Threat and Defence Strategies

    Home Advanced Endpoint Security Navigating Living-off-the-Land Attacks: Understanding Threat and Defence Strategies

    Navigating Living-off-the-Land Attacks: Understanding Threat and Defence Strategies

    By Andrea Kemsley | Advanced Endpoint Security | Comments are Closed | 14 October, 2024 | 0

    In cybersecurity, “Living-off-the-land” (LotL) attacks have become increasingly difficult to detect. These attacks exploit legitimate system tools like PowerShell, WMI, or Office macros instead of relying on external malware, allowing attackers to move stealthily within a network. Traditional security measures struggle to identify these attacks, as they use trusted, digitally signed tools.

    LotL attacks appeal to cybercriminals because they evade detection and reduce the risk of being traced. This low-profile approach increases the chances of a successful breach, as attackers remain hidden for longer periods.

    Common Techniques in LotL Attacks

    • PowerShell: Exploited to download and run malicious scripts, establish remote connections, or alter system settings without clear traces.
    • WMI: Utilised to remotely execute commands, gather system data, or maintain persistence on the system.
    • Remote Administration Tools: Tools like PsExec can be repurposed to execute malicious commands remotely.
    • Office Macros: Malicious macros embedded in Office documents execute code upon opening, exploiting user trust.

    Protecting Against LotL Attacks with WatchGuard Advanced EPDR:

    • Application Control: Restrict tools like PowerShell and WMI to specific users and processes.
    • Monitoring and Automated Behaviour Analysis: Use behaviour analytics in the Cloud to detect unusual system activities, rather than relying solely on signatures or endpoint technology.

    To successfully implement these strategies, apart from the Zero-Trust Application Service that blocks untrusted applications, allowing their execution only after validating their trustability, and the Threat Hunting Service, WatchGuard Advanced EPDR offers functionalities that enable security analysts to quickly detect and respond to an attacker’s presence using LotL techniques.

    Analysts can prevent these attacks by denying applications like PowerShell and WMI or automatically detecting typical behaviours used in fileless malware attacks and mapping them to the MITRE ATT&CK framework.

    Now, the new version of Advanced EPDR allows analysts to investigate these behaviours by accessing enriched telemetry with threat intelligence from a single console point.

    Additionally, WatchGuard Advanced EPDR provides valuable information for incident investigations involving malicious applications. It identifies MITRE ATT&CK techniques, the capabilities of malicious activities the programme can exhibit, and the external functions it uses. These may include invoking operating system operations or other libraries by natively integrating CAPA, an open-source tool for automatically analysing application behaviour.

    1. Extension of Investigation and Rapid Response through Remote Shell: The new version of WatchGuard Advanced EPDR includes the ability to open a remote shell to obtain files, inspect processes, and even take direct action on the endpoint, whether it is Windows, Linux, or macOS.
    2. Do not allow connections if they pose a risk: Limiting communication between different network segments or endpoints using network segmentation can prevent attackers from moving laterally using LotL techniques. The new version of WatchGuard Advanced EPDR enables administrators to deny connections from noncompliant endpoints that pose a risk to protected endpoints, further enhancing organisations’ security posture.
    3. Education and Awareness: Training employees on the risks of macros and the safe use of administrative tools can help prevent the inadvertent execution of malicious scripts.

    Living-off-the-land attacks represent a significant challenge in modern cybersecurity. By exploiting legitimate system tools and functionalities, attackers can operate with a low profile, evading many traditional security solutions. Effective detection and prevention of these attacks require a combination of robust technical controls, constant monitoring, and strong security training for users. With the new version of WatchGuard Advanced EPDR, organisations can enhance their ability to detect, prevent, and respond to these advanced threats, ensuring a more secure and resilient environment.

    Discover more about WatchGuard Advanced EPDR by contacting the team at Dolos.

    Contact us
    Advanced Endpoint Detection & Response
    WatchGuard Technologies

    Related Post

    • AI: Vital Tool or Rising Threat?

      By Andrea Kemsley | Comments are Closed

      In a world as technologically dependent as the one we live in, individuals and companies are more vulnerable than ever to multiple threats, ranging from ransomware and malware attacks to data theft and other formsRead more

    • Modern SOC Series V: how modern SOCs help organisations manage cyber risk

      By Andrea Kemsley | Comments are Closed

      Cyber adversaries constantly leverage sophisticated, malicious applications and legitimate tools to infiltrate organisations and evade existing security controls. To counter such attacks, security teams need to transition from security management to proactive security operations, efficientlyRead more

    • Modern SOC Series IV: the various deployment models of a modern SOC operation

      By Andrea Kemsley | Comments are Closed

      Constructing a modern SOC A modern SOC (Security Operations Centre) can be built internally, although many organisations lack the in-house resources to accomplish this and struggle to find suitable staff members due to the deepRead more

    • Modern SOC Series III: Managing risk – the professionals behind a modern SOC

      By Andrea Kemsley | Comments are Closed

      Modern SOCs are highly specialised security operations centres whose objective is to detect attackers who have gained access to an organisation’s device or network. Built around complex environments, a team of cybersecurity experts who haveRead more

    • Modern SOC Series II: six meaningful benefits of modernising SOCs

      By Andrea Kemsley | Comments are Closed

      The growing number and complexity of threats, combined with the expansion of the attack surface, complicate the primary purpose of a Security Operations Centre (SOC): detecting, analysing, and responding to security incidents. These factors generateRead more

    Recent Posts

    • 6 May, 2025
      0

      The Top Cyber Challenges in an Increasingly Digital World

    • 1 April, 2025
      Comments Off on Exciting Q2 Promotions on WatchGuard Fireboxes

      Exciting Q2 Promotions on WatchGuard Fireboxes

    • 5 March, 2025
      Comments Off on Insider Threats: Why Companies Can’t Afford to Ignore the Danger Within

      Insider Threats: Why Companies Can’t Afford to Ignore the Danger Within

    • 18 February, 2025
      Comments Off on Strengthen Cybersecurity in Financial Services Companies

      Strengthen Cybersecurity in Financial Services Companies

    Categories

    • Add-on Modules
    • Advanced Endpoint Security
    • Channel Partner Program
    • DNS Protection
    • Endpoint Detection & Response
    • Endpoint Protection
    • Multi-Factor Authentication
    • Network Security
    • Secure Wi-Fi
    • Unified Security

    Tags

    Adaptive Defense Adaptive Defense 360 AuthPoint DNSWatchGo Panda Security Patch Management Premium Threat Hunting Service Threat Hunting Platform WatchGuard WatchGuardONE WatchGuard Technologies
    • Dax Data Logo
    •   Unit 1 Melomed Office Park
      Punters Way
      Kenilworth
      Cape Town
      7708
    •   +27 21 683 3899
    •   sales@dolos.africa

    Useful Links

    • Solutions
    • Contact
    • Partners
    • Support

    News

    • The Top Cyber Challenges in an Increasingly Digital World

      2025 could be the most challenging year yet for the digital environment.

      6 May, 2025
    • Exciting Q2 Promotions on WatchGuard Fireboxes

      Upgrade your customers to XDR from WatchGuard with these exciting offers for

      1 April, 2025
    Copyright © 2025 Dolos. All Rights Reserved.  |  Privacy Policy
    • Home
    • Solutions
      • Endpoint Security
        • Endpoint Protection
        • Endpoint Detection & Response
        • Add-on Modules
        • DNS Protection
      • Advanced Endpoint Security
        • Advanced EDR & EPDR
        • Threat Hunting Platform
        • Add-on Modules
        • MDR
      • XDR – Unified Security
      • Network Security
      • Multi-Factor Authentication
      • Secure Wi-Fi
      • Document Security
      • RMM Solutions
      • Cyber Assessment
    • Partners
    • News
      • Blog
      • Press Office
    • Support
    • About Us
    • Contact
    Dolos
    Contact us for more information