Glitch effect

What Are LOLBINs?

Imagine a thief targeting a large hotel for unauthorized access to guests’ rooms. To keep a low profile, they find an unattended housekeeping cart and grab the master key. Now they can move around the hotel with full access, looking just like the regular staff doing their job.

This is basically how misuse of Living Off the Land Binaries (LOLBins) works.

Instead of dropping malware, attackers slip through the cracks by relying on trusted, legitimate pre-installed operating system executables. They blend into the normal network noise that IT teams expect in the targeted environment.

This technique dodges antivirus (AV) detection— and any business can fall victim to it.

Watch this clip from our Security Operations Center to spot a LOLBins compromise in the attack path.

Glitch effectGlitch effect
Glitch banner


Share

[PH] Learn More About Phishing

[PH] Huntress delivers everything you want from a security tool, all designed with the unique needs of outsourced IT and security teams in mind.
[PH] Phishing attempts can show up as messages from your bank, your boss, your utility providers, or even the government. One click from one user can compromise an entire network and inadvertently let hackers deploy ransomware, steal information, or worse.
[PH] The median time it takes for a user to click a link and enter information is less than 60 seconds. With a turnaround time that quick, it's no wonder phishing is one of the preferred methods used by hackers. (2024 Verizon Data Breach Report)
Glitch effectGlitch effectBlurry glitch effect