Living off the Land (LotL) Attacks

  • FEBRUARY 18TH, 2026
  • 2min read
Living off the Land (LotL) Attacks

Living off the Land (LotL) attacks occur when threat actors misuse legitimate tools already present within a system to perform malicious activity. Rather than deploying traditional malware, attackers leverage trusted administrative utilities to blend into normal operations and evade detection.

In 2026, threat actors exploited vulnerabilities in SolarWinds Web Help Desk to gain unauthorised access to systems and installed legitimate administrative and monitoring tools to evade detection.

How LotL Attacks Work

Attackers typically:
1. Gain initial access through phishing, stolen credentials, or exposed services
2. Use built-in tools (e.g., PowerShell, WMI, remote administration utilities)
3. Escalate privileges and move laterally across systems
4. Establish persistence, exfiltrate data, or deploy ransomware

These actions often resemble normal administrative activity, making detection more difficult.

Why It Matters

LotL techniques are frequently observed in ransomware incidents, business email compromise (BEC), insider threats, and advanced persistent threat (APT) campaigns.

Because the activity relies on legitimate system tools, organisations must prioritise visibility, monitoring, and access control rather than attempting to block tools outright.

Risk Factors

Organisations face increased risk if they:
1. Allow excessive administrative privileges
2. Lack of centralised logging and monitoring
3. Do not enforce multi-factor authentication (MFA)
4. Have weak password or credential management practices

Recommended Best Practices

1. Strengthen Access Controls: Enforce multi-factor authentication (MFA), apply least-privilege principles, and regularly review privileged accounts.

2. Enhance Monitoring: Implement centralised logging, monitor administrative tool usage, and establish alerts for unusual behaviour patterns.

3. Harden Systems: Restrict unnecessary administrative utilities, disable unused services, and apply security patches promptly.

4. Promote User Awareness: Conduct regular phishing awareness training and encourage prompt reporting of suspicious activity.

Explore more CIL Advisories

Defending Against Autonomous AI Agents and Machine-Speed Intrusion Chains

Defending Against Autonomous AI Agents and Machine-Speed Intrusion Chains

In February 2024, a joint Microsoft and OpenAI investigation found state-sponsored groups, including Forest Blizzard (Russia) and Charcoal Typhoon (China),…

MARCH 23RD, 2026

Read More
Identity Crisis – The Rise of PhaaS & MFA Bypass

Identity Crisis – The Rise of PhaaS & MFA Bypass

In March 2024, cybersecurity researchers at Sekoia.io discovered a massive surge in the Tycoon2FA PhaaS platform. This kit was used…

MARCH 16TH, 2026

Read More
Critical Remote Code Execution (RCE) in React Server Components: CVE-2025-55182

Critical Remote Code Execution (RCE) in React Server Components: CVE-2025-55182

While React Server Components (RSC) improves user experience, it creates a powerful bridge between the client and the server's core.…

MARCH 11TH, 2026

Read More

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Living off the Land (LotL) Attacks

Contact Us

Message Sent!

Thank you for reaching out. We have received your message and will get back to you shortly.

Check your email for a confirmation from us.

Start a project

Project Request Submitted!

Thank you for your interest. Our team will review your project details and reach out to you soon.

Check your email for a confirmation from us.