Report: Trusted Windows applications abused

Advertising

Share post

In its new Active Adversary Report 2024, Sophos reveals the wolf in sheep's clothing: Cyber ​​criminals are increasingly relying on trustworthy Windows applications for their attacks. Criminal use, commonly referred to as "Living Off the Land" binaries, is increasing by 51 percent. Lockbit is the number 1 ransomware despite government intervention.

Sophos' new Active Adversary Report, titled "The Bite from Inside," provides a detailed look at how attackers' behaviors and techniques have changed in the first half of 2024. The analysis data comes from nearly 200 incident response cases handled by the Sophos X-Ops IR team and Sophos X-Ops Managed Detection and Response team in the first six months of 2024.

Advertising
Perfect SME cybersecurity
How small and medium-sized enterprises defend against AI-led attacks with tailored security

Abused Windows tools are less noticeable

🔎 The increase in abused Windows tools and applications (LOLbins) in 2024 is clear (Image: Sophos).

The most important finding of the current research: Attackers are increasingly using trusted applications and tools on Windows systems for their activities - also known as "Living Off the Land" binaries (LOLbins). Cybercriminals want to avoid rapid detection and sneak around a compromised IT infrastructure for as long as possible. Compared to 2023, Sophos recorded an increase of 51 percent here, and even 83 percent since 2021.

Among the 187 different Microsoft LOLbins that were illegally misused in the first half of 2024, the Remote Desktop Protocol (RDP) was the most abused trusted application. Of the nearly 200 incident response cases analyzed, attackers exploited RDP in 89 percent. This dominance continues a trend first observed in the 2023 Active Adversary report, where RDP abuse accounted for 90 percent of all IR cases examined.

Advertising

Remote Desktop Protocol (RDP) most abused

"LOLbins not only provide a way to hide an attacker's activities, but unfortunately often imply tacit approval of their activities," said John Shier, Field CTO at Sophos. "While the misuse of other legitimate tools often raises alarm bells for defenders, the misuse of a Microsoft binary often has the opposite effect, as it is an integral part of Windows and has legitimate uses.

In order to quickly identify abuse, it is extremely important that system administrators know exactly how these files are used in their environments. Without a nuanced and contextual awareness of the IT environment, including continuous vigilance for new and evolving events on the network, the often overburdened IT teams run the risk of overlooking important threat activities. One solution here can be a modern managed detection and response service that brings external experts on board and relieves the burden on IT teams."

Key findings from the Active Adversary Report

  • Lockbit is still number 1. Despite government interventions against the main leak website and its infrastructure, LockBit was the most prevalent ransomware group in February, accounting for about 21 percent of infections in the first half of 2024.
  • The main gateway continues to be compromised access data. This continues a trend which was first identified in the Active Adversary Report for Tech LeadersCompromised credentials are still the main cause of attacks in 39 percent of cases, but this is down from 56 percent in 2023.
  • Older Active Directory servers are the main targets for compromise. 87 percent of attackers have compromised Active Directory server versions from 2019, 2016 and 2012. All three of these versions no longer receive mainstream support from Microsoft - so they are one step away from end-of-life (EOL) where no patch is possible without paid support from Microsoft.
More at Sophos.com

 


About Sophos

More than 100 million users in 150 countries trust Sophos. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. They offer the lowest total cost of ownership in the industry. Sophos offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and the web. In addition, there is support from SophosLabs, our worldwide network of our own analysis centers. The Sophos headquarters are in Boston, USA and Oxford, UK.


 

Matching articles on the topic

Sophisticated Phishing-as-a-Service (PhaaS) platform

Security researchers have uncovered a sophisticated Phishing-as-a-Service (PhaaS) platform that poses a serious threat to organizations around the world. The threat actor ➡ Read more

PDFs: The Trojan Horses of Hackers

Cybercriminals are increasingly using the popular PDF file format to hide malicious code. Recent IT forensics findings underscore this: 68 ➡ Read more

LockBit leak site hacked and data stolen

Now LockBit has also become the victim of another hacker: It seems that not only the leak page of the group was hacked, but ➡ Read more

Maximum IT security for OT systems

OT systems are rarely attacked directly. However, gaps and vulnerabilities in traditional IT make OT systems more vulnerable to attacks. ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Algorithms for post-quantum cryptography

A provider of IT security solutions introduces Quantum Protect, a post-quantum cryptography application suite for its u.trust General Purpose Hardware Security Modules (HSMs) ➡ Read more

Power grid threat: security gaps in solar systems

A cybersecurity solutions provider published its research report “SUN:DOWN – Destabilizing the Grid via Orchestrated Exploitation of Solar Power Systems”, which ➡ Read more

Cloud and SaaS security is inadequate

A recent study shows that companies' security strategies are failing to keep pace with the rapid adoption of cloud-native technologies. 28 ➡ Read more