Australian Signals Directorate – Identifying and Mitigating Living Off the Land Techniques

https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques

A joint advisory sourced from MANY different agencies covers off common living off the land techniques and common gaps in cyber defense capabilities.

As put in this joint advisory: Living off the Land involves the abuse of native tools and processes on systems, especially living off the land binaries, often referred to as LOLBins, to blend in with normal system activities and operate discreetly with a lower likelihood of being detected or blocked because these tools are already deployed and trusted in the environment.

To simplify; LOLBins are administrative tooling, typically used by your IT admins and staff, that are abused by threat actors for nefarious purposes.

Resources for Living-off-the-land binaries (LOLBins) across different Operating Systems can be found here:

A MUST READ for defenders and network administrators to defend against these advanced techniques that aren’t typically detected and prevented by security applications and monitoring tools. Some key takeaways from my read so far (I’m still reviewing) include;

This advisory is based on a previous joint advisory published by CISA on a PRC adversary utilising LOTL techniques: https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a

Leave a comment