3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内,并且不需要特定的开头。首先,我得仔细阅读文章,抓住主要内容。 文章主要讲的是网络安全威胁的变化。过去是通过阻止恶意软件来防御攻击,但现在攻击者转向利用内部可信工具进行攻击。比如PowerShell、WMIC等工具,这些本来是IT团队常用的,但被滥用后很难检测。 接下来,文章提到三个原因:攻击不再显眼、攻击面扩大且未受管理、检测难以跟上速度。最后,建议进行内部攻击面评估来降低风险。 现在我要把这些要点浓缩到100字以内。要确保涵盖主要观点:内部可信工具的滥用、三个原因以及解决方案。 可能的结构是:先点明威胁变化,再简述原因,最后提出解决方案。这样既全面又简洁。 检查一下字数是否在限制内,并确保语言流畅自然。 </think> 网络安全威胁正在从传统恶意软件转向利用内部可信工具(如PowerShell、WMIC)进行攻击。攻击者通过合法工具隐藏行为,扩大攻击面并绕过检测。组织需评估内部攻击面以降低风险。 2026-4-1 10:58:0 Author: thehackernews.com(查看原文) 阅读量:5 收藏

Threat Detection / Artificial Intelligence

For years, cybersecurity has followed a familiar model: block malware, stop the attack. Now, attackers are moving on to what’s next.

Threat actors now use malware less frequently in favor of what’s already inside your environment, including abusing trusted tools, native binaries, and legitimate admin utilities to move laterally, escalate privileges, and persist without raising alarms. Most organizations fail to see this risk until after the damage is done.

To help visualize this challenge, consider a complimentary Internal Attack Surface Assessment — a guided, low-friction way to see where trusted tools may be working against you.

Now, let’s look at how this risk operates within your environment, and 3 reasons why attackers prefer using your own tools against you.

1. Most Attacks No Longer Look Like Attacks

Threat actors prefer attacks that don’t look like attacks.

Recent analysis of over 700,000 high-severity incidents shows a clear shift: 84% of attacks now abuse legitimate tools to evade detection. This is the essence of Living off the Land (LOTL).

Instead of dropping payloads that trigger alerts, attackers use built-in tools like PowerShell, WMIC, and Certutil — the same tools your IT team relies on every day. These actions blend into normal operations, making it extremely difficult to distinguish between legitimate use and malicious intent.

The result is a dangerous blind spot. Security teams are no longer just looking for “bad files.” They’re trying to interpret behavior — often in real time, under pressure, and without full context.

And by the time something clearly looks wrong, the attacker is already deep inside the environment.

2. Your Attack Surface Is Larger Than You Think — And Mostly Unmanaged

Attackers look for unmanaged tools you already have.

Consider a clean Windows 11 system.

Out of the box, it includes hundreds of native binaries — many of which can be abused for LOTL attacks. These tools are trusted by default, embedded into the OS, and often required for legitimate tasks or application functionality.

That creates some fundamental challenges.

  • You can’t simply block them without breaking workflows. 
  • You can’t easily monitor them without generating noise. 
  • In most cases, you don’t know how broadly they’re accessible across your organization.

Analysis shows that up to 95% of access to risky tools is unnecessary. One factor is uncontrolled access to these tools; another is allowing them to perform every function they are capable of, including functions rarely used by IT but frequently used by attackers. 

Every unnecessary permission becomes a potential attack path. And when attackers don’t need to introduce anything new, your defenses are already at a disadvantage.

3. Detection Alone Can’t Keep Up

Detection is so strong that attackers are looking for alternatives.

EDR and XDR are critical and highly effective for detecting malware and threats that stand out from normal activity. However, detection is increasingly becoming an exercise in interpretation as threat actors abuse legitimate tools to blend in. Is that PowerShell command legitimate? Is that process execution expected?

Now add speed.

Modern attacks, increasingly assisted by AI, move faster than teams can investigate. By the time suspicious behavior is confirmed, lateral movement and persistence may already be established. That’s why relying solely on detection is no longer enough. 

What Most Teams Lack: Internal Attack Surface Visibility

If understanding the scope of your internal attack surface feels like something you should investigate, you’re right. But most teams lack the time or resources to map the details.

  • Which tools are accessible across the organization?
  • Where access is excessive or unnecessary?
  • How do those access patterns translate into real attack paths?

Even when the risk is understood conceptually, proving it, and prioritizing it, is difficult. That’s why this issue persists.

From Reactive to Proactive: Start With Insight

Closing this gap doesn’t start with adding another tool. It starts with understanding your true risk.

The Bitdefender Complimentary Internal Attack Surface Assessment will provide you with a clear, data-driven view of how exposed you are due to your trusted tools, so you can clearly see the scope of your internal attack surface. This guided assessment focuses on identifying unnecessary access, surfacing real risk, and providing prioritized recommendations, without disrupting your users or adding operational overhead for you.

See Your Environment the Way Attackers Do

LOTL attacks are becoming the default. This means the most significant risk is what’s already in your environment, and the sooner you understand how attackers can move through your systems using trusted tools, the sooner you can reduce those pathways and prevent a successful attack.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/3-reasons-attackers-are-using-your.html
如有侵权请联系:admin#unsafe.sh