LOLBins: Attackers Are Abusing Trusted Binaries to Target Organizations

lolbins-living-off-the-land-tool-abuse

Trust is one of the key pillars information security is built on. It’s ultimately what determines who has access to what, which applications are allowed to run and which aren’t. But what happens when trust is abused? For example, when authorized, trusted applications are used by bad actors?

Article Link: https://blog.barkly.com/what-are-lolbins-living-off-the-land-binaries