Imagine a thief targeting a large hotel for unauthorized access to guests’ rooms. To keep a low profile, they find an unattended housekeeping cart and grab the master key. Now they can move around the hotel with full access, looking just like the regular staff doing their job.
This is basically how misuse of Living Off the Land Binaries (LOLBins) works.
Instead of dropping malware, attackers slip through the cracks by relying on trusted, legitimate pre-installed operating system executables. They blend into the normal network noise that IT teams expect in the targeted environment.
This technique dodges antivirus (AV) detection— and any business can fall victim to it.
Watch this clip from our Security Operations Center to spot a LOLBins compromise in the attack path.