WinGet can be more than a package manager. We show how .๐ ๐๐๐๐๐ configs + a self-referencing LNK become a viable initial access payload when Microsoft Store is enabled. Includes detection queries & mitigation tips.
blog.compass-security.com/2026/03/wing...
#RedTeam #Windows #LOLBins #InitialAccess
~Elastic~
Article details a hypothesis-driven approach to threat hunting for LOLBins using Elastic Security's AI Assistant and analytics.
-
IOCs: (None identified)
-
#LOLBins #ThreatHunting #ThreatIntel
I just learned about #LOLbins, Itโs actually an old technic (Living Off the Land) which implies no โphysicalโ files on the FS.
arstechnica.com/security/202...
This goes beyond simple shell exploitation :
github.com/sheimo/aweso...
#security
Cybercriminals are exploiting QR codes, ClickFix tactics, and LOLBins to bypass traditional security measures. Stay vigilant and enhance your defenses. #CyberSecurity #Phishing #LOLBins Link: thedailytechfeed.com/emerging-cyb...
~Anyrun~
Threat actors use social engineering (ClickFix), QR code phishing, and LOLBins to deliver stealers and RATs, bypassing automated defenses.
-
IOCs: (None identified)
-
#LOLBins #Malware #Phishing #ThreatIntel
LNK files sent via Discord drop Moq.zip; odbcconf.exe loads a malicious DLL RAT that bypasses AMSI and patches EtwEventWrite to disable ETW. Detection should focus on odbcconf.exe/process tree anomalies and extracted PDF decoys. #LNK #RAT #LOLBins https://bit.ly/46mvWXQ
~Trendmicro~
Crypto24 ransomware blends legitimate tools with custom malware to bypass EDR and exfiltrate data before encryption.
-
IOCs: WinMainSvc. dll, MSRuntime. dll, AVB. exe
-
#Crypto24 #LOLBins #Ransomware #ThreatIntel
What are #LOLbins? Learn how attackers exploit these binaries, explore Sigma rules for detection, and check out relevant mitigations.
LOLBins/Drivers Key resources:
โ LOLBAS: [lolbas-project.github.io](lolbas-project.github.io)
โ LOLDrivers: [loldrivers.io](www.loldrivers.io)
Detect abused tools & malicious drivers.
#LOLBins #LOLDrivers
LolBins + minimal tweaks = bypassed EDRs ๐ง
Join Wietze Beukema at #NullconGoa2025 to learn how LOLBins can bypass EDR detections and introduce a tool that creates your own obfuscated command lines for security testing or research
๐ nullcon.net/goa-2025/spe...
#EDR #LOLBins #LOLBAS
Day 15 of Cabby42โs InfoSec Advent Calendar is here!
Todayโs pick: LOLBins and GTFOBinsโlegitimate tools used for malicious purposes. Learn more to stay ahead.
Resources:
LOLBins: https://buff.ly/2zE27oC
GTFOBins: https://buff.ly/2MUZXqu
#InfoSecAdvent #Cybersecurity #Cabby42 #LOLBins
Hackers are increasingly abusing Microsoft tools, with a staggering 51% rise in LOLbins used in attacks this year! ๐จ๐ป Key players include RDP, PowerShell, and cmd.exe. Sophos emphasiz multi approach ๐โจ Read more: www.techradar.com/pro/security... #CyberSecurity #Microsoft #LOLbins #TechNews
Cisco Talos Q3 Trends: LoLBins, Infostealers, Business Email Compromise (BEC), AitM (Adversary in the Middle), Insiders.
|
blog.talosintelligence.com/incident-res...
|
#InfoSec #CyberSecurity #LoLBins #InfoStealers #BEC #AitM #Insiders