What is a “Living off the Land” (LOLBAS) attack?
Here’s how it works!
- Company user accesses a compromised website, inserts an infected USB drive, or opens a phishing email.
- The attacker scans the machine for weak spots and targets.
- The attacker hides malware into an already-existing, white-listed software.
- The attacker searches and executes malicious activity under the radar.
- The attacker continues to gets data/executes malicious activity using the planted malware, since the software used for cover is white-listed.
We see time and time again that companies are not upgrading their Endpoint Detection & Response (EDR) capabilities. This is a huge vulnerability in IT/network security because LOLBAS attacks exploit the local operating systems (OS) to avoid detection by using tools or features that already exist in the target environment, making it more difficult for defenders to detect or prevent.
Some EDR software lack the capabilities to stop, or even detect, LOLBAS based attacks!
To combat this type of attack, we mapped and developed an out-of-the-box integration rules bundle which leverages built-in windows auditing capabilities to detect such attacks, minimizing an expensive risk with a quick (and easy) solution. The LOLBAS bundle includes around 200 unique detection rules.
One of the LOLBAS rules within the bundle is Regsvr32:
Regsvr32 is a command-line utility to register and unregister OLE controls, such as DLLs and ActiveX controls in the Windows Registry.
An adversary can use this signed Windows binary to achieve signed-binary proxy execution defined by MITRE ATT&CK as technique T1117.
It may be possible to bypass application whitelist solutions because the execution of signed system binaries might be allowed.
This method makes no changes to the Registry as the COM object is not actually registered, only executed.
To learn more about this attack , visit MITRE.