/
랜섬웨어 억제

Modern Trojan Horse: How Attackers Live Off the Land and How to Stop Them

Odysseus didn’t breach Troy with brute force.

He infiltrated them from the inside — hidden inside a wooden horse the Trojans thought was a gift. That night, his forces emerged and took the city from within.

It was the perfect deception: use what’s trusted, give no warnings — just strategy, patience, and knowledge of the enemy’s blind spots.

Today’s most advanced cyberattacks follow the same playbook. Attackers exploit the native tools already inside your systems. They move quietly and stay hidden. Like Odysseus, they use what’s trusted to break through undetected.

The Wooden Horse, painted by a Florentine artist, Biagio d’Antonio, in the late 15th century.

Trusted tools, hidden threats

In cybersecurity, living-off-the-land (LOTL) cyberattacks evade detection by using legitimate, built-in system tools like PowerShell or WMI.

These tools download malicious payloads, move laterally, and exfiltrate data — all alongside normal network traffic. No malware is installed, and no suspicious files are dropped, which is why these attacks often go unnoticed for months.

LOTL attacks now account for the majority of modern cyber intrusions. A 2025 analysis of over 700,000 incidents found that 84% of major attacks involved LOTL techniques.

Why are they so effective? Operating systems come preloaded with powerful tools meant for administrators, and attackers are turning them into weapons. Once inside, they use those same tools to blend in, maintain access, and quietly expand their reach.

A 2025 analysis of over 700,000 incidents found that 84% of major attacks involved LOTL techniques.

This makes Living off the Land attacks harder to detect — and much harder to stop.

While many LOTL attacks occur on Windows, using trusted tools and executing code in memory can also apply to macOS and Linux.  

On macOS, attackers can exploit native services like AppleScript and the launchd command to persist and execute commands. On Linux, they could rely on Bash, SSH, cron jobs, and in-memory execution to operate without writing files to disk and evading traditional detection.

Example of system tools available in Windows
Example of system tools available in Windows

Did the recent SharePoint ToolShell exploit “live off the land?”

In July 2025, Microsoft disclosed active exploitation of two SharePoint zero-day vulnerabilities (CVE202553770 and CVE202553771), collectively known as ToolShell.

The flaws — Linen Typhoon, Violet Typhoon, and Storm2603 — affected internet-facing on-premises servers and were exploited by state-backed actors.

These threat groups used vulnerabilities to execute remote code, steal machine keys, escalate privileges, and deploy ransomware, including Warlock and LockBit variants, across hundreds of vulnerable systems.

Michael Adjei, director of systems engineering at Illumio, shares his perspective on what stands out in the ToolShell exploits: “It isn’t just the use of native tools — it’s how attackers moved from initial access to lateral movement without triggering traditional alarms. This incident reinforces a key reality: if defenders are only watching for malware, they’re already behind.”

Ransomware + Living off the Land: a potent combo

Another powerful example of this stealthy approach is Medusa ransomware.

In February 2024, the FBI and CISA issued a joint advisory (#StopRansomware: Medusa Ransomware) warning of its growing threat to critical infrastructure. More than 300 organizations have already been hit, including hospitals, financial institutions, schools, and government services.  

Medusa doesn’t rely on flashy zero-days or obvious malware. Instead, it blends in — using trusted tools like PowerShell, WMI, RDP, SSH, and remote access software like ScreenConnect to move across hybrid environments and avoid detection.

Modern ransomware doesn’t come crashing through the front door — it blends in like a spy.

Why the NSA sounded the alarm on LOTL

In 2024, the NSA, CISA, and international partners released a joint advisory warning of the surge in LOTL intrusions.

This wasn’t triggered by one breach, but by a disturbing trend: advanced threat actors, including state-sponsored groups, were increasingly using native tools to quietly infiltrate critical infrastructure.

The tipping point? Campaigns like Volt Typhoon, where attackers burrowed into U.S. communications, energy, and transportation systems without deploying traditional malware.

The advisory was clear: LOTL techniques had become a go-to strategy for nation-state attackers, and defenders needed to adapt immediately.

SolarWinds: a master class in LOTL

One of the earlier and most damaging examples of LOTL tradecraft happened in 2020, when threat actors quietly inserted malware into a routine Orion update from SolarWinds.

When customers installed it, attackers gained access to some of the most sensitive networks in the world, including U.S. government agencies and Fortune 500 companies.

By using native Windows tools and mimicking normal Orion activity, the attackers evaded detection for months. The malware activated only on high-value targets. Once inside, there was widespread data exfiltration, and they covered their tracks.  

The White House later attributed the attack to Russian intelligence.

Stopping LOTL requires seeing what others miss

These attacks don’t rely on malware and abuse the legitimate tools already inside your network. Security teams need visibility into how systems normally communicate so that they can detect unusual behavior and quarantine threats in real time.  

Key defenses include:

  • Lateral movement detection: visibility into system-to-system communication is essential to uncover attackers moving within environments.
  • Behavioral threat detection: analytics that identify abnormal use of native tools help surface activity that blends into normal operations.
  • Alert prioritization: filtering out routine behavior and highlighting suspicious patterns is critical when attackers use trusted processes.
  • Rapid containment: the ability to isolate compromised assets quickly — without waiting for malware signatures — can stop LOTL techniques before they spread.

In a world where attackers live off the land, defenders need the power to see and control how their environment is being used.

Discover how Illumio Insights stops LOTL threats before they spread. Start your free trial today.

관련 주제

관련 기사

랜섬웨어에 집중: 랜섬웨어 대응 네트워크 구축을 위한 3가지 진실
랜섬웨어 억제

랜섬웨어에 집중: 랜섬웨어 대응 네트워크 구축을 위한 3가지 진실

랜섬웨어 공격의 확산으로부터 안전한 네트워크 구축에 대한 통찰력을 얻으십시오.

랜섬웨어: 중소기업이 확산을 막을 수 있는 방법
랜섬웨어 억제

랜섬웨어: 중소기업이 확산을 막을 수 있는 방법

Learn how Zero Trust segmentation helps small and midsize organizations visualize traffic flows, close pathways, and halt ransomware’s lateral spread.

전문가 Q&A: 기업이 여전히 랜섬웨어에 비용을 지불하는 이유는 무엇입니까?
랜섬웨어 억제

전문가 Q&A: 기업이 여전히 랜섬웨어에 비용을 지불하는 이유는 무엇입니까?

조직의 평판, 재정 및 보안 위험에도 불구하고 몸값을 지불하게 만드는 요인에 대한 전문가의 견해를 들어보십시오.

Medusa 랜섬웨어가 중요 인프라에 대한 위협이 커지는 이유
랜섬웨어 억제

Medusa 랜섬웨어가 중요 인프라에 대한 위협이 커지는 이유

Medusa 랜섬웨어의 작동 원리와 전 세계 중요 인프라에 왜 그렇게 위험한지 알아보십시오.

Here BE Dragons: 중요 인프라에 대한 사이버 위협 증가
사이버 레질리언스

Here BE Dragons: 중요 인프라에 대한 사이버 위협 증가

전 세계적 긴장이 고조되고 정부 지원 단체가 공공 시설, 의료 서비스 등을 표적으로 삼으면서 2025년에 중요 인프라에 대한 사이버 공격이 어떻게 증가하고 있는지 알아보십시오.

두 번의 보안 침해, 하나의 은행: ICBC 사이버 위기가 주는 교훈
사이버 레질리언스

두 번의 보안 침해, 하나의 은행: ICBC 사이버 위기가 주는 교훈

미국의 랜섬웨어와 런던의 데이터 도난이라는 두 가지 주요 보안 침해로 글로벌 뱅킹의 시스템적 취약성이 드러난 ICBC 사이버 위기에서 얻은 중요한 교훈을 확인해 보십시오.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?