Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    EA Sports FC 25, FBC: Firebreak and more Xbox Game Pass in June

    June 8, 2025

    Princess Peach’s voice has been replaced by the actor after 18 years

    June 8, 2025

    Best technical gifts for Father’s Day 2025

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Gadgets»Cyber ​​criminals love this ancient Windows tool, but a small CLI utility is their new secret weapon
    Gadgets

    Cyber ​​criminals love this ancient Windows tool, but a small CLI utility is their new secret weapon

    PineapplesUpdateBy PineapplesUpdateJune 7, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Cyber ​​criminals love this ancient Windows tool, but a small CLI utility is their new secret weapon
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Cyber ​​criminals love this ancient Windows tool, but a small CLI utility is their new secret weapon


    • Netsh.exe is the most misconduct Windows tool, and it still hides in plain vision
    • Powershell shows 73% at closing points, not only in the administrator hands
    • WMIC’s amazing return shows the attackers that no person is watching anymore

    A new analysis of 700,000 security events has shown how large -scale cyber criminals have exploited reliable Microsoft Tools that are not to bare the system.

    While the tendency of attackers using native utilities, known as the Living of the Land (Lottle) strategy, is not new, the latest data of the Gravitijone platform of the bitDender shows that it is already more wider.

    84% of high-seriousness attacks included the use of valid system binergies already existing on a shocking machines. It reduces the effectiveness of traditional rescue, even those who are marketed as the best antivirus or best malware security.

    You may like

    The most misused some of the equipment would be very familiar to systems administrators, including Powershell.exe and wscript.exe.

    However, a device unexpectedly emerged at the top: Netsh.exe. A command -line utility for the management of network configurations, Netsh.exe was found in one -third of the major attacks – and while it is still used for firewall and interface management, its frequent presence in the attack chain suggests that its ability to misuse has been underestimated.

    Powershell remains a major component of both legitimate operation and malicious activity – although 96% of organizations use Powershell, it was running at 73% closing points, which is beyond the scope of being expected from administrative use alone.

    Bitdefender found, “Third-party applications running the powershel code without a visible interface” were a common reason.

    To get all the top news, opinions, facilities and guidance, sign up on Techradar Pro Newsletter, which your business needs to be successful!

    This dual-use is difficult to detect nature, especially for devices supported by behavioral-quiet engines.

    The question raises whether the best EPP solutions for this blurred line between normal and nefarious use are adequately tuned.

    Another amazing discovery was the continuous use of wmic.exe, a device that Microsoft has demolished.

    Regardless of its age, analysis suggests that it is still widely present in the atmosphere, which is often invited by the software seeking information of the system. This is particularly attractive when the attackers are trying to mix due to its valid appearance.

    To deal with the issue, Bitdefnder developed PhasR (active strict and attack on surface deficiency). This device employs a targeted approach that goes beyond disabled only.

    The company said, “PhasR goes beyond blocking the entire tool, also monitors and prevents the attackers on specific tasks used within them.”

    Nevertheless, this approach is not without business. The fundamental dilemma, “cannot live with them, cannot live without them”, remains unresolved.

    You might also like

    Ancient CLI criminals Cyber love secret small tool Utility Weapon Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSonos ERA 300 is currently on sales of 20 percent
    Next Article Get a new look on Sleep Awake, a psychide from the bluebhouse and the nine inch nails’ Robin Finak
    PineapplesUpdate
    • Website

    Related Posts

    Gadgets

    Best technical gifts for Father’s Day 2025

    June 8, 2025
    Gadgets

    NASA’s IMAP spacecraft gears for mission to detect the edge of the solar system

    June 8, 2025
    Gadgets

    2025 Best Samsung phone, test and reviewed

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025591 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025535 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025462 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Huawei Watch Fit 4 Pro Review: This is great, provided you can get one thing

    May 16, 20250 Views

    Robot Video: Battlefield Triages, Firefighting Drone, and more

    May 16, 20250 Views

    Norman Reids of Death Stranding and The Walking Dead does not think “anyone can understand”

    May 16, 20250 Views
    Our Picks

    EA Sports FC 25, FBC: Firebreak and more Xbox Game Pass in June

    June 8, 2025

    Princess Peach’s voice has been replaced by the actor after 18 years

    June 8, 2025

    Best technical gifts for Father’s Day 2025

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.