{"id":31191,"date":"2023-07-21T21:55:10","date_gmt":"2023-07-21T21:55:10","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=31191"},"modified":"2023-10-16T23:52:53","modified_gmt":"2023-10-16T23:52:53","slug":"living-off-the-land-attacks","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/","title":{"rendered":"Living Off the Land Attacks: LOTL Definition &amp; Prevention"},"content":{"rendered":"\n<p>Living off the land (LOTL) attacks use legitimate programs that already exist on a computer, rather than installing malware from an external source onto a system. The stealthy nature of these attacks can make them effective \u2014 and difficult for security teams to detect and prevent.<\/p>\n\n\n\n<p>To prevent LOTL attacks, security teams must use sophisticated detection methods, as well as closing loops in popular computer programs with known vulnerabilities. This guide to LOTL security explains some of the most common LOTL vulnerabilities and prevention methods that security teams can use.<\/p>\n\n\n\n<p><strong>Jump ahead to:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"#mechanics\">How Living off the Land Attacks Work<\/a><\/li>\n\n\n\n<li><a href=\"#access\">How Do LOTL Attackers Access Your Machine?<\/a><\/li>\n\n\n\n<li><a href=\"#best-practices\">5 Best Practices for Preventing LOTL Attacks<\/a><\/li>\n\n\n\n<li><a href=\"#recovery\">How to Recover from Living Off the Land Attacks<\/a><\/li>\n\n\n\n<li><a href=\"#tools\">What Tools Help Defend Against LOTL Attacks?<\/a><\/li>\n<\/ul>\n\n\n<!-- ICP Plugin: Start --><div class=\"icp-list icp-list-main icp-list-body-top3 row\">\n    \n        <!--\n            ICP Plugin - body top3\n            ----------\n            Category: \n            Country: HK\n        -->\n    <\/div>\n<!-- ICP Plugin: End -->\n\n\n\n<h2 class=\"wp-block-heading\" id=\"mechanics\">How Living off the Land Attacks Work<\/h2>\n\n\n\n<p>Living off the land attacks originate within a valid computer program, like script-writing software or a command line tool. Attackers gain access to the program and perform actions like writing new malicious code or escalating their own user privileges.<\/p>\n\n\n\n<p>Many attacks like these are known as fileless malware attacks because they don&#8217;t need code to be installed onto a machine through an external file. Rather, they use a legitimate source. Often, LOTL attacks don&#8217;t have a signature, either.<\/p>\n\n\n\n<p>A lack of signature or of recognizable <a href=\"https:\/\/www.esecurityplanet.com\/threats\/malware\/\">malware<\/a> makes it very difficult to track and identify LOTL attacks. Such an attack can&#8217;t always be found in a feed of common threats. IT and security teams will often have trouble locating the initial problem because the threat comes from a valid computer program on their organization&#8217;s network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"access\">How Do LOTL Attackers Access Your Machine?<\/h2>\n\n\n\n<p>If a threat actor finds legitimate existing credentials for an application or program, they can log in without having to download malware or brute force their way into the system. They may use a tool like Mimikatz to extract credentials stored in memory, steal credentials to a powerful management program like PowerShell, or they might find login information for IT remote access applications like TeamViewer and AnyDesk, which help IT admins connect remote computers. Any compromised application that allows users to make changes \u2014 or even an application that simply allows too many permissions \u2014 can result in an LOTL attack.<\/p>\n\n\n\n<p>Note that although brute forcing passwords can still permit a threat actor to carry out an LOTL attack, they&#8217;re more noticeable to security teams.<\/p>\n\n\n\n<p>Threat actors can also identify backdoors that haven&#8217;t been closed off properly. Back doors are vulnerabilities within a computer program that allow users to access the program without following the predetermined guidelines for entry (namely, credentials and any additional authentication).<\/p>\n\n\n\n<p>LOTL attacks are often simplest for <a href=\"https:\/\/www.esecurityplanet.com\/products\/data-loss-prevention-dlp-solutions\/\">malicious insiders<\/a> to carry out. These attackers may not even need to steal credentials or find a backdoor because they&#8217;re already a trusted member of the organization they&#8217;re attacking.<\/p>\n\n\n\n<p><strong>Read more about the <a href=\"https:\/\/www.esecurityplanet.com\/threats\/how-hackers-evade-detection\/\">ways hackers evade detection<\/a>.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Commonly exploited programs<\/h3>\n\n\n\n<p>While there are literally hundreds of avenues an LOTL attacker can use, not all of them are regularly exploited. The following tools are some common vectors used to carry out LOTL attacks.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Windows Management Instrumentation<\/h4>\n\n\n\n<p>Windows Management Instrumentation (WMI) is a management tool for Windows admins to write scripts and connect computer systems. If taken over, it has admin privileges that allow an attacker to perform a variety of different tasks. An attacker could download code from an external system to then run it on that computer system. This type of malicious code is harder to track because it was pulled by a legitimate Windows tool, rather than downloaded directly from an outside email or file.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Mimikatz<\/h4>\n\n\n\n<p>Mimikatz can pull credentials from computer memory and increase users&#8217; access privileges. It&#8217;s a vulnerability within Windows that allows an attacker to decrypt hidden passwords while they&#8217;re in memory. Mimikatz can be exploited either by using older versions of Windows than Windows 10 or by escalating privileges enough to then toggle the Mimikatz capability on.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">PowerShell<\/h4>\n\n\n\n<p>PowerShell is a Microsoft task and configuration tool that uses command line functionality. It&#8217;s useful for IT admins who need to manage configuration jobs for business devices, including for remote workforces. But PowerShell is also highly exploitable \u2014 a Cisco study found that it was used in more than <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-source-of-third-of-critical-security-threats\/\">a third of critical security threats<\/a>. Its remote support means that an attacker who takes control of the command line can control the entire network of connected devices. PowerShell is also available to more junior IT employees, so it often doesn&#8217;t have tight enough access controls.<\/p>\n\n\n\n<p><strong>Read more: <a href=\"https:\/\/www.esecurityplanet.com\/threats\/powershell-security\/\">Cybersecurity Agencies Release Guidance for PowerShell Security<\/a><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Behaviors on exploited systems<\/h3>\n\n\n\n<p>Once a threat actor has breached a legitimate application, they may do the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Escalate their privileges so they can take administrative actions<\/li>\n\n\n\n<li>Write malicious commands directly into the command line<\/li>\n\n\n\n<li>Steal data from that application and move it to an external location for future use<\/li>\n\n\n\n<li>Access another application on the company&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/networks\/network-security\/\">network<\/a> through lateral movement<\/li>\n<\/ul>\n\n\n\n<p>A prized target of hackers is often <a href=\"https:\/\/www.esecurityplanet.com\/products\/active-directory-security-tools\/\">Active Directory<\/a>, which controls credentials and access rights on Windows domain networks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"best-practices\">5 Best Practices for Preventing LOTL Attacks<\/h2>\n\n\n\n<p>The following strategies help your business not only prepare for LOTL attacks but also reduce threat actors&#8217; opportunities to compromise your legitimate systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use LOLBINS to track binary activity<\/h3>\n\n\n\n<p>The Living off the Land Binaries, Scripts, and Libraries project (<a href=\"https:\/\/lolbas-project.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">LOLBAS<\/a>) offers a comprehensive list of exploits attackers use. It&#8217;s best to study one binary (LOLBIN) at a time, examining how the specific program is typically used. Once your team knows what appropriate usage looks like, you can begin identifying abnormal behavior from that program.<\/p>\n\n\n\n<p>Derek Wilson, principal consultant at security firm NetSPI, underscored the importance of using this resource. &#8220;By finding a way to baseline detections against something like the Living Off the Land Binaries And Scripts (LOLBAS) project, which is set up to track LOTL threats, teams can then build proactive detection plans for the procedures that aren&#8217;t caught,&#8221; he said.<\/p>\n\n\n\n<p>Wilson recommended additional software to help teams develop general detection methods. &#8220;Breach and attack simulation (BAS) tools are invaluable in baselining detective controls and continuously improving detection of LOTL attacks,&#8221; he said. <a href=\"https:\/\/www.esecurityplanet.com\/products\/breach-and-attack-simulation-bas-vendors\/\">BAS tools<\/a> give security teams insight into an attack lifecycle, behaving like a threat actor might to find security weaknesses more quickly.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Block binaries and allow only necessary applications<\/h3>\n\n\n\n<p>Block binaries that are frequently exploited in LOTL attacks. According to Wilson, prevention is the first step to protect computer systems from attacks. He recommends that security teams review <a href=\"https:\/\/learn.microsoft.com\/en-us\/windows\/security\/threat-protection\/windows-defender-application-control\/microsoft-recommended-block-rules\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft\u2019s recommended block rules<\/a> and <a href=\"https:\/\/learn.microsoft.com\/en-us\/microsoft-365\/security\/defender-endpoint\/attack-surface-reduction?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">attack surface reduction rules<\/a> as a &#8220;jumping-off point.&#8221;<\/p>\n\n\n\n<p>&#8220;These resources are full of LOTL-abusable binaries that organizations should not use,&#8221; Wilson said. &#8220;Still, the recommendation is to find out if you really need these binaries available and, if not, to block them outright.&#8221;<\/p>\n\n\n\n<p>Wilson also recommends application <a href=\"https:\/\/www.esecurityplanet.com\/applications\/whitelisting-vs-blacklisting-which-is-better\/\">allowlisting<\/a>, which helps reduce LOTL risks by significantly limiting the number of applications that your systems can use. Rather than just blocking a few bad applications, allowlisting, or whitelisting, permits only the software your business&#8217;s teams explicitly need.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Monitor user behavior<\/h3>\n\n\n\n<p>Employ advanced behavioral monitoring and analytics. While behavioral monitoring may not solve every LOTL question, it&#8217;s a more advanced method of tracking user behavior. Behavioral technology like <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">UEBA<\/a> looks at the details of user activity, including lengthy periods spent in a particular system, the time of day that a command is given, and other deviations from typical behavior.<\/p>\n\n\n\n<p><strong>Read more about <a href=\"https:\/\/www.esecurityplanet.com\/applications\/behavioral-analytics-cybersecurity-does-it-work\/\">behavioral analytics in cybersecurity<\/a>.<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Keep a close eye on credentials<\/h3>\n\n\n\n<p>Update credentials if one account has been demonstrating strange behavior \u2014 the account may have been hacked or abused. If an IT admin&#8217;s PowerShell account has been giving unusual series of commands or performing actions at a strange time of day, reset the password for that local user account. If an attacker is using valid credentials to access that PowerShell instance, they&#8217;ll have to find another way into the program.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use multifactor authentication<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/mobile\/multi-factor-authentication\/\">MFA technologies<\/a> help minimize the chance that an attacker can log in using valid credentials. They&#8217;d have to have access to the legitimate user&#8217;s phone or biometrics, depending on the additional MFA method. While MFA is difficult to set up for tools like PowerShell, it&#8217;s critical for all security software and important for programs that integrate with other programs. If an attacker logs into one of these programs, they could laterally move to another tool in the network and wreak havoc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"recovery\">How to Recover from Living Off the Land Attacks<\/h2>\n\n\n\n<p>If your business has already undergone an LOTL attack, take the following recovery steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Change credentials for any accounts or systems affected.<\/strong> Setting new passwords, particularly strong ones, will help re-strengthen exploited accounts.<\/li>\n\n\n\n<li><strong>Store credentials securely.<\/strong> Don&#8217;t just rely on creating strong passwords \u2014 use cryptographic tools like <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-password-managers\/\">password managers<\/a> to protect them from prying eyes.<\/li>\n\n\n\n<li><strong>Back up all necessary files<\/strong> on the hard drive from the infected system and then perform a clean install of your machine&#8217;s OS. This deletes any compromised programs so they can be replaced by a newly installed, uninfected version.<\/li>\n\n\n\n<li><strong>Perform an access control audit.<\/strong> Everyone in the organization should only have access to the applications they absolutely need to do their job; this reduces the number of available credentials to vulnerable programs.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"tools\">What Tools Help Defend Against LOTL Attacks?<\/h2>\n\n\n\n<p>While not an exhaustive list, the following technologies provide advanced security measures that go beyond basic detection and response methods.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">UEBA<\/h3>\n\n\n\n<p><a href=\"https:\/\/www.esecurityplanet.com\/products\/best-user-and-entity-behavior-analytics-ueba-tools\/\">UEBA<\/a> providers like LogRhythm and Rapid7 help businesses explore user behavior at a more advanced level. Using behavioral analytics to detect malicious actions can help security teams identify LOTL threats they wouldn&#8217;t otherwise find.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Adaptive Protection<\/h3>\n\n\n\n<p>Symantec&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/products\/edr-solutions\/\">endpoint protection<\/a> solution has an Adaptive Protection feature that uses behavioral analytics and threat telemetry to identify legitimate applications that are being exploited and to shut down LOTL attack paths. It also examines legitimate applications&#8217; standard behavior to identify anomalies over time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Managed threat hunting<\/h3>\n\n\n\n<p>Managed <a href=\"https:\/\/www.esecurityplanet.com\/threats\/threat-hunting\/\">threat hunting<\/a> providers employ teams of experts to perform detailed threat searches and analysis. If your IT or security teams don&#8217;t have the time or resources to examine computer systems for potential LOTL attacks, managed services like <a href=\"https:\/\/www.esecurityplanet.com\/networks\/managed-detection-and-response-mdr\/\">MDR<\/a> are a good choice. These experts have dedicated time and tools to identify potential malicious behavior from legitimate business applications.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Detection engineering<\/h3>\n\n\n\n<p>Detection engineering uses logs and other data sources to identify specific predetermined threats that security teams don&#8217;t yet have a method of detecting. It&#8217;s intended to develop a long-term threat detection lifecycle that teams can use over time. To begin the detection engineering process, teams should perform threat modeling based on the attacks they&#8217;re most likely to experience and the tools they use most often.&nbsp; While few vendors have solutions specific to detection engineering, teams can use <a href=\"https:\/\/www.esecurityplanet.com\/products\/siem-tools\/\">log management<\/a> and <a href=\"https:\/\/www.esecurityplanet.com\/products\/threat-intelligence-platforms\/\">threat intelligence<\/a> tools as part of their own detection strategy.&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"bottom-line\">Bottom Line: Protecting Against Living-off-the-Land Attacks<\/h2>\n\n\n\n<p>While living off the land attacks are challenging for security teams to identify, the development of advanced cybersecurity methods and threat detection will help organizations approach LOTL with more confidence. While LOTL threat reduction can be time-consuming, tactics like managed threat hunting and behavioral analytics are promising because they help teams dive into the specifics of attack prevention and identification. The more data your team can access and understand, the better prepared you&#8217;ll be to identify subtle attacks.<\/p>\n\n\n\n<p><strong>Read next: <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-secure-a-network\/\">Network Protection: How to Secure a Network<\/a><\/strong><\/p>\n\n\n<div id=\"ta-campaign-widget-66d701a074674-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d701a074674\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d701a074674\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d701a074674\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d701a074674\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d701a074674\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d701a074674\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.<\/p>\n","protected":false},"author":238,"featured_media":31194,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[6455,2369,3790,1146,3414,2478,730,22929,5277],"b2b_audience":[33,35],"b2b_industry":[],"b2b_product":[382,378,395,384,381,31776,31782,31777],"class_list":["post-31191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-access-management","tag-cloud-security","tag-cybersecurity","tag-malware","tag-network-security","tag-ransomware","tag-security","tag-vulnerability-management","tag-web-security","b2b_audience-awareness-and-consideration","b2b_audience-implementation-and-support","b2b_product-application-security-vulnerability-management","b2b_product-endpoint-security","b2b_product-firewalls-and-intrusion-prevention-and-detection","b2b_product-identity-management-privacy","b2b_product-network-access-control-nac","b2b_product-siem","b2b_product-threat-intelligence","b2b_product-ueba"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Living Off the Land Attacks: LOTL Definition &amp; Prevention<\/title>\n<meta name=\"description\" content=\"Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Living Off the Land Attacks: LOTL Definition &amp; Prevention\" \/>\n<meta property=\"og:description\" content=\"Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-21T21:55:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-16T23:52:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"Living Off the Land Attacks: LOTL Definition &amp; Prevention\",\"datePublished\":\"2023-07-21T21:55:10+00:00\",\"dateModified\":\"2023-10-16T23:52:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\"},\"wordCount\":1940,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png\",\"keywords\":[\"access management\",\"cloud security\",\"cybersecurity\",\"malware\",\"network security\",\"ransomware\",\"security\",\"Vulnerability Management\",\"Web security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\",\"name\":\"Living Off the Land Attacks: LOTL Definition & Prevention\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png\",\"datePublished\":\"2023-07-21T21:55:10+00:00\",\"dateModified\":\"2023-10-16T23:52:53+00:00\",\"description\":\"Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png\",\"width\":1400,\"height\":933,\"caption\":\"Red virtual warning sign over a laptop keyboard.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Living Off the Land Attacks: LOTL Definition &amp; Prevention\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Living Off the Land Attacks: LOTL Definition & Prevention","description":"Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Living Off the Land Attacks: LOTL Definition & Prevention","og_description":"Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/","og_site_name":"eSecurity Planet","article_published_time":"2023-07-21T21:55:10+00:00","article_modified_time":"2023-10-16T23:52:53+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"Living Off the Land Attacks: LOTL Definition &amp; Prevention","datePublished":"2023-07-21T21:55:10+00:00","dateModified":"2023-10-16T23:52:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/"},"wordCount":1940,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png","keywords":["access management","cloud security","cybersecurity","malware","network security","ransomware","security","Vulnerability Management","Web security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/","url":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/","name":"Living Off the Land Attacks: LOTL Definition & Prevention","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png","datePublished":"2023-07-21T21:55:10+00:00","dateModified":"2023-10-16T23:52:53+00:00","description":"Learn how to prevent living off-the-land attacks (LOTL). Explore techniques, detection, and prevention strategies for robust cybersecurity defense.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-living-off-the-land-attacks.png","width":1400,"height":933,"caption":"Red virtual warning sign over a laptop keyboard."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/living-off-the-land-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"Living Off the Land Attacks: LOTL Definition &amp; Prevention"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31191"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=31191"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31191\/revisions"}],"predecessor-version":[{"id":32398,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/31191\/revisions\/32398"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/31194"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=31191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=31191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=31191"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=31191"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=31191"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=31191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}