Some cyber attacks are delivered in an instant. A user opens a malicious attachment and bad things happen immediately. Ransomware attacks, one of the most common and lucrative cyber attack types, fit into this rapid fire and result category. In these cases, the bad thing that happens immediately is that essential data is encrypted and made inaccessible - and not just the single user’s data, this typically impacts data across the entire organization.
There are other cyber attacks that use tactics in order to play a long game. These attacks will achieve the adversary/adversaries goals as a slow, cumulative process. They may also be designed for a delayed final impact, saving the worst for last and ready to blow up (so to speak) at a time that is most advantageous for the adversary and most damaging to the victim organization.
These stealthy, long game attacks are often carried out by adversaries labeled as an Advanced Persistent Threat (APT). There are numerous good descriptions for APT, but Wikipedia’s entry is solid here:
An advanced persistent threat (APT) is a stealthy threat actor, typically a nation state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals
Living off the Land - or, in fancier cyber-speak with a fun acronym, Living off the Land Binaries, Scripts, and Libraries (LOLBAS) - is a core tactic for long game attackers. They want to minimize the “noise” they make in the victim’s environment in all but the final stages of an attack. Noise in this case means alerts generated in security tools that can make the defensive cybersecurity team aware of their presence.
So how does Living off the Land work?
This tactic makes use of the built-in functionality of the operating system (OS) in target environments, and the binaries, scripts, and libraries that are native to the OS. A couple of the biggest advantages of this approach are:
The adversary does not have to install malicious software (malware). This saves effort and makes attack activities much more difficult to detect for many security detection tools.
Native elements of an OS are often ignored / whitelisted within detection tools.
Examples of Native Tools Used for Living off the Land
Here’s a short list of some of the most commonly used native, built-in tools for living off the land in a Windows environment:
PowerShell: a scripting tool that is a core component of the Windows OS
FTP: a file transfer protocol built in to Windows and other operating systems
DNS: the domain name system that translates company network device names and website names to IP addresses to allow traffic to them. DNS is often used to exfiltrate (transfer out) data from a victim’s network.
BITS: Another file transfer service - Microsoft’s Background Intelligent Transfer Service - which will be whitelisted by security tools and allowed through firewalls.
Scheduled Tasks: Another handy and versatile built-in tool that will fly under the radar of many detection tools.
There are many more of these LOLBAS tools, and the list is continually growing as adversaries refine their craft in this area.
I hope that this overview of Living off the Land is useful and I am going to look to write at least a few more posts on some more cybersecurity terms in coming weeks and months.
Good info, Patrick! I've seen the term "living off the land" the the past few months in the cyber security press. Thanks for the explanation! Ernie