{"id":18639,"date":"2021-05-17T18:27:02","date_gmt":"2021-05-17T18:27:02","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=18639"},"modified":"2021-06-18T18:51:08","modified_gmt":"2021-06-18T18:51:08","slug":"powershell-source-of-third-of-critical-security-threats","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/","title":{"rendered":"PowerShell Is Source of More Than a Third of Critical Security Threats"},"content":{"rendered":"<p dir=\"ltr\">PowerShell was the source of more than a third of critical threats detected on endpoints in the second half of 2020, according to a Cisco research study released at the RSA Conference today.<\/p>\n<p dir=\"ltr\">The top category of threats detected across endpoints by Cisco Secure Endpoint was dual-use tools leveraged for exploitation and post-exploitation tasks. PowerShell Empire, Cobalt Strike, PowerSploit, Metasploit and other such tools have legitimate uses, Cisco noted in the <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/endpoint-security-outcomes-study.html\" target=\"_blank\" rel=\"noopener\">report<\/a>, but they&#8217;ve become part of the attacker toolkit too. Such &#8220;living off the land&#8221; tactics can avoid detection when deploying foreign tools or code to compromise systems.<\/p>\n<p dir=\"ltr\">In second place was <a href=\"https:\/\/www.esecurityplanet.com\/threats\/ransomware-protection\/\">ransomware<\/a>, and after the recent <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-zero-trust-security-can-protect-against-ransomware\/\">Colonial Pipeline hack<\/a> probably needs no further comment.<\/p>\n<p dir=\"ltr\">The third most frequently detected critical Indicator of Compromise (IoC) group was fileless malware &#8211; also a common PowerShell threat. This type of <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware-types\/\">malware<\/a> does not use executable files and has no signature, making it challenging to detect. Fileless malware often manifests itself via suspicious process injections and registry activity. Common fileless malware types include Kovter, Poweliks, Divergent, and Lemon Duck.<\/p>\n<p dir=\"ltr\">Dual-use tools were also responsible for the fourth most common threat: Credential dumping, which is used by hackers to scrape login credentials from a compromised machine. The most commonly detected tool was Mimikatz, which Cisco Secure Endpoint caught dumping credentials from memory.<\/p>\n<p dir=\"ltr\">Those four categories are responsible for more than 80 percent of critical IoCs. The rest include threats like worms, remote access trojans (RATs), and banking trojans, with a mix of various downloaders, wipers, and rootkits.<\/p>\n<p dir=\"ltr\">&#8220;Based on Cisco&#8217;s research, PowerShell is the source of more than a third of critical threats,&#8221; noted Gedeon Hombrebueno, Endpoint Security Product Manager for Cisco Secure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18640\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2021\/05\/powershell-security-threats.jpg\" alt=\"PowerShell security\" width=\"878\" height=\"384\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/powershell-security-threats.jpg 878w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/powershell-security-threats-300x131.jpg 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/powershell-security-threats-768x336.jpg 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/powershell-security-threats-150x66.jpg 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/powershell-security-threats-696x304.jpg 696w\" sizes=\"(max-width: 878px) 100vw, 878px\" \/><\/p>\n<h2 dir=\"ltr\">Protecting PowerShell from Hackers<\/h2>\n<p dir=\"ltr\">Hombrebueno told <em>eSecurity Planet<\/em> that a &#8220;layered approach&#8221; is needed to secure PowerShell and other tools and utilities:<\/p>\n<ul>\n<li dir=\"ltr\" role=\"presentation\">Employing multiple prevention techniques to stop memory injection attacks that can penetrate endpoints by exploiting vulnerabilities in applications and operating system processes<\/li>\n<li dir=\"ltr\" role=\"presentation\">Protecting against script-based attacks to prevent certain DLLs from being loaded by some commonly exploited desktop applications and their child processes<\/li>\n<li dir=\"ltr\" role=\"presentation\">Using behavioral analysis to match a stream of activity records against a set of attack activity patterns to protect against malicious use of living-off-the-land tools<\/li>\n<li dir=\"ltr\" role=\"presentation\">Running complex queries and PowerShell activity monitoring on endpoints to gain deeper visibility on what happened to any endpoint<\/li>\n<li dir=\"ltr\" role=\"presentation\">Applying one-click or automated response actions to remediate the problem<\/li>\n<\/ul>\n<p dir=\"ltr\">Hombrebueno said Cisco Secure Endpoint can help with all those practices &#8220;without the added complexity.&#8221;<\/p>\n<p dir=\"ltr\">Cisco Secure Endpoint is one of our <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">top endpoint detection and response (EDR) products<\/a>. EDR tools are generally effective against PowerShell attacks.<\/p>\n<p dir=\"ltr\">See also: <a href=\"https:\/\/www.esecurityplanet.com\/endpoint\/mitre-protection-tests-endpoint-security\/\">MITRE Protection Tests Shed New Light on Endpoint Security<\/a><\/p>\n<h2 dir=\"ltr\">How To Secure PowerShell<\/h2>\n<p dir=\"ltr\">The Center for Internet Security offers <a href=\"https:\/\/www.cisecurity.org\/white-papers\/intel-insights-how-to-secure-powershell\" target=\"_blank\" rel=\"noopener\">a number of steps admins can take<\/a> to help secure PowerShell, Microsoft&#8217;s command-line interface management tool for Windows and Windows Server.<\/p>\n<p dir=\"ltr\">First, only network admins and other IT pros need access to the Microsoft command-line interface tool, so prevent or restrict its execution and allow execution of signed scripts only. Disable or restrict Windows Remote Management while you&#8217;re at it.<\/p>\n<p dir=\"ltr\">CIS includes a tutorial for for managing Script Execution in Group Policy Settings.<\/p>\n<p dir=\"ltr\">To Turn on Script Execution in Group Policy settings:<\/p>\n<ul>\n<li dir=\"ltr\" role=\"presentation\">Click Start Menu &gt; Control Panel &gt; System and Security &gt; Administrative Tools<\/li>\n<li dir=\"ltr\" role=\"presentation\">Create or Edit Group Policy Objects &gt; Windows PowerShell &gt; Turn on Script Execution<\/li>\n<\/ul>\n<p dir=\"ltr\">To Turn on Script Execution policy settings:<\/p>\n<ul>\n<li dir=\"ltr\" role=\"presentation\">Disabling Turn on Script Execution will mean that scripts do not run and PowerShell is disabled<\/li>\n<li dir=\"ltr\" role=\"presentation\">If you enable Turn on Script Execution, you can select the execution policy Allow only signed scripts<\/li>\n<\/ul>\n<p dir=\"ltr\">Digital risk management vendor Digital Shadows also offers a number of <a href=\"https:\/\/www.digitalshadows.com\/blog-and-research\/powershell-security-best-practices\/\" target=\"_blank\" rel=\"noopener\">PowerShell security tips<\/a>, including using Constrained Language mode, and NetSPI discusses 15 <a href=\"https:\/\/www.netspi.com\/blog\/technical\/networks\/-penetration-testing\/15-ways-to-bypass-the-powershell-execution-policy\/\" target=\"_blank\" rel=\"noopener\">ways that PowerShell execution policies can be bypassed<\/a>. <a href=\"https:\/\/docs.poshtools.com\/powershell-pro-tools-documentation\/powershell-protect\" target=\"_blank\" rel=\"noopener\">PowerShell Protect<\/a> is a downloadable tool that i<span data-slate-fragment=\"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\">ntegrates with the Antimalware Scan Interface to audit and block scripts before they execute. <\/span><\/p>\n<p dir=\"ltr\">\n\n\n<div id=\"ta-campaign-widget-66d6e6ca3adc2-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6e6ca3adc2\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6e6ca3adc2\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6e6ca3adc2\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6e6ca3adc2\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6e6ca3adc2\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6e6ca3adc2\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>PowerShell was the source of more than a third of critical threats detected on endpoints in the second half of 2020, according to a Cisco research study released at the RSA Conference today. The top category of threats detected across endpoints by Cisco Secure Endpoint was dual-use tools leveraged for exploitation and post-exploitation tasks. PowerShell [&hellip;]<\/p>\n","protected":false},"author":163,"featured_media":18641,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[15],"tags":[5648,3790],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[31788,378,379],"class_list":["post-18639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-threats","tag-advanced-persistent-threats","tag-cybersecurity","b2b_audience-awareness-and-consideration","b2b_product-advanced-persistent-threats","b2b_product-endpoint-security","b2b_product-threats-and-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PowerShell Is Source of Over 1\/3 of Critical Security Threats<\/title>\n<meta name=\"description\" content=\"The number one source of critical security threats is Microsoft&#039;s CLI management tool, according to Cisco endpoint security data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PowerShell Is Source of Over 1\/3 of Critical Security Threats\" \/>\n<meta property=\"og:description\" content=\"The number one source of critical security threats is Microsoft&#039;s CLI management tool, according to Cisco endpoint security data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-17T18:27:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-18T18:51:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Paul Shread\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Shread\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\"},\"author\":{\"name\":\"Paul Shread\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\"},\"headline\":\"PowerShell Is Source of More Than a Third of Critical Security Threats\",\"datePublished\":\"2021-05-17T18:27:02+00:00\",\"dateModified\":\"2021-06-18T18:51:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\"},\"wordCount\":671,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png\",\"keywords\":[\"advanced persistent threats\",\"cybersecurity\"],\"articleSection\":[\"Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\",\"name\":\"PowerShell Is Source of Over 1\/3 of Critical Security Threats\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png\",\"datePublished\":\"2021-05-17T18:27:02+00:00\",\"dateModified\":\"2021-06-18T18:51:08+00:00\",\"description\":\"The number one source of critical security threats is Microsoft's CLI management tool, according to Cisco endpoint security data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png\",\"width\":1000,\"height\":400,\"caption\":\"powershell security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PowerShell Is Source of More Than a Third of Critical Security Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04\",\"name\":\"Paul Shread\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg\",\"caption\":\"Paul Shread\"},\"description\":\"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PowerShell Is Source of Over 1\/3 of Critical Security Threats","description":"The number one source of critical security threats is Microsoft's CLI management tool, according to Cisco endpoint security data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"PowerShell Is Source of Over 1\/3 of Critical Security Threats","og_description":"The number one source of critical security threats is Microsoft's CLI management tool, according to Cisco endpoint security data.","og_url":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/","og_site_name":"eSecurity Planet","article_published_time":"2021-05-17T18:27:02+00:00","article_modified_time":"2021-06-18T18:51:08+00:00","og_image":[{"width":1000,"height":400,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png","type":"image\/png"}],"author":"Paul Shread","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Paul Shread","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/"},"author":{"name":"Paul Shread","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04"},"headline":"PowerShell Is Source of More Than a Third of Critical Security Threats","datePublished":"2021-05-17T18:27:02+00:00","dateModified":"2021-06-18T18:51:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/"},"wordCount":671,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png","keywords":["advanced persistent threats","cybersecurity"],"articleSection":["Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/","url":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/","name":"PowerShell Is Source of Over 1\/3 of Critical Security Threats","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png","datePublished":"2021-05-17T18:27:02+00:00","dateModified":"2021-06-18T18:51:08+00:00","description":"The number one source of critical security threats is Microsoft's CLI management tool, according to Cisco endpoint security data.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2021\/05\/logo-microsoft-powershell.png","width":1000,"height":400,"caption":"powershell security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"PowerShell Is Source of More Than a Third of Critical Security Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/ff409b3839bb3ee2e8f2a1ec6f4d6d04","name":"Paul Shread","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2022\/09\/EDITED-HH-85962095_Paul_Shread_20220906_144803_edited-150x150.jpg","caption":"Paul Shread"},"description":"Former eSecurityPlanet Editor Paul Shread has covered nearly every aspect of enterprise technology in his 20+ years in IT journalism, including award-winning articles on endpoint security and virtual data centers. He wrote a column on small business technology for Time.com, and covered financial markets for 10 years, from the dot-com boom and bust to the 2007-2009 financial crisis. He holds market analyst and cybersecurity certifications. In a previous life he worked for daily newspapers, including the Baltimore Sun, and spent 7 years covering the federal government. Al Haig once compared him to Bob Woodward (true story - just ask Google).","url":"https:\/\/www.esecurityplanet.com\/author\/paul-shread-2\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18639"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/163"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=18639"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/18639\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/18641"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=18639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=18639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=18639"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=18639"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=18639"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=18639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}