Advertisement ยท 728 ร— 90
#
Hashtag
#LOLBins
Advertisement ยท 728 ร— 90
Post image

WinGet can be more than a package manager. We show how .๐š ๐š’๐š—๐š๐šŽ๐š configs + a self-referencing LNK become a viable initial access payload when Microsoft Store is enabled. Includes detection queries & mitigation tips.
blog.compass-security.com/2026/03/wing...
#RedTeam #Windows #LOLBins #InitialAccess

4 3 0 0
Proactive Threat Hunting with Elastic Security

~Elastic~
Article details a hypothesis-driven approach to threat hunting for LOLBins using Elastic Security's AI Assistant and analytics.
-
IOCs: (None identified)
-
#LOLBins #ThreatHunting #ThreatIntel

0 0 0 0
Preview
ClickFix may be the biggest security threat your family has never heard of Relatively new technique can bypass many endpoint protections.

I just learned about #LOLbins, Itโ€™s actually an old technic (Living Off the Land) which implies no โ€œphysicalโ€ files on the FS.

arstechnica.com/security/202...

This goes beyond simple shell exploitation :
github.com/sheimo/aweso...

#security

0 0 0 0
Post image

Cybercriminals are exploiting QR codes, ClickFix tactics, and LOLBins to bypass traditional security measures. Stay vigilant and enhance your defenses. #CyberSecurity #Phishing #LOLBins Link: thedailytechfeed.com/emerging-cyb...

0 0 0 0
New Malware & Phishing Tactics

~Anyrun~
Threat actors use social engineering (ClickFix), QR code phishing, and LOLBins to deliver stealers and RATs, bypassing automated defenses.
-
IOCs: (None identified)
-
#LOLBins #Malware #Phishing #ThreatIntel

0 0 0 0

LNK files sent via Discord drop Moq.zip; odbcconf.exe loads a malicious DLL RAT that bypasses AMSI and patches EtwEventWrite to disable ETW. Detection should focus on odbcconf.exe/process tree anomalies and extracted PDF decoys. #LNK #RAT #LOLBins https://bit.ly/46mvWXQ

0 0 0 0
Crypto24 Ransomware Uses LOLBins & Custom Malware

~Trendmicro~
Crypto24 ransomware blends legitimate tools with custom malware to bypass EDR and exfiltrate data before encryption.
-
IOCs: WinMainSvc. dll, MSRuntime. dll, AVB. exe
-
#Crypto24 #LOLBins #Ransomware #ThreatIntel

1 0 0 0
Preview
What Are LOLBins? | SOC Prime Gain insights into LOLBins, their exploitation by threat actors, and detect attacks with relevant Sigma rules from SOC Prime Platform.

What are #LOLbins? Learn how attackers exploit these binaries, explore Sigma rules for detection, and check out relevant mitigations.

1 0 0 0
LOLBAS

LOLBins/Drivers Key resources:
โ†’ LOLBAS: [lolbas-project.github.io](lolbas-project.github.io)
โ†’ LOLDrivers: [loldrivers.io](www.loldrivers.io)
Detect abused tools & malicious drivers.
#LOLBins #LOLDrivers

1 0 0 0
Post image

LolBins + minimal tweaks = bypassed EDRs ๐Ÿง

Join Wietze Beukema at #NullconGoa2025 to learn how LOLBins can bypass EDR detections and introduce a tool that creates your own obfuscated command lines for security testing or research

๐Ÿ‘‰ nullcon.net/goa-2025/spe...

#EDR #LOLBins #LOLBAS

0 0 0 0
Preview
LOLBAS

Day 15 of Cabby42โ€™s InfoSec Advent Calendar is here!

Todayโ€™s pick: LOLBins and GTFOBinsโ€”legitimate tools used for malicious purposes. Learn more to stay ahead.

Resources:

LOLBins: https://buff.ly/2zE27oC
GTFOBins: https://buff.ly/2MUZXqu
#InfoSecAdvent #Cybersecurity #Cabby42 #LOLBins

0 0 0 0
Preview
Hackers are abusing Microsoft tools more than ever before Abuse of LOLbins in cyberattacks is skyrocketing, Sophos says

Hackers are increasingly abusing Microsoft tools, with a staggering 51% rise in LOLbins used in attacks this year! ๐Ÿšจ๐Ÿ’ป Key players include RDP, PowerShell, and cmd.exe. Sophos emphasiz multi approach ๐Ÿ”’โœจ Read more: www.techradar.com/pro/security... #CyberSecurity #Microsoft #LOLbins #TechNews

0 0 0 0

Cisco Talos Q3 Trends: LoLBins, Infostealers, Business Email Compromise (BEC), AitM (Adversary in the Middle), Insiders.
|
blog.talosintelligence.com/incident-res...
|
#InfoSec #CyberSecurity #LoLBins #InfoStealers #BEC #AitM #Insiders

0 0 0 0