What are Living Off the Land (LOTL) Attacks?
An attacker sits inside your network for an extended period. No custom malware. No suspicious executables. Every action uses tools your operating system shipped with. This is the documented reality of Volt Typhoon, a PRC state-sponsored threat actor that maintained access to U.S. critical infrastructure, including communications, energy, transportation, and water systems, using native system tools and valid credentials, according to a CISA advisory.
Living off the land, or LOTL, is a class of adversary behavior that abuses native tools and processes already present on a target system. Attackers use these trusted, pre-installed binaries, known as Living Off the Land Binaries or LOLBins, to blend in with normal system activity, operate discreetly, and avoid triggering security controls. The CISA guidance published in March 2025 defines this approach as one that lets threat actors "avoid investing in the development and deployment of custom tools" while lowering their likelihood of being found or blocked.
LOTL operates across Windows, Linux, macOS, cloud, and hybrid environments. On macOS, the equivalent concept is called "Living Off the Orchard," or LOOBins. The technique spans the full attack lifecycle, from initial execution through persistence, lateral movement, credential access, and data exfiltration. For defenders, that means behavioral visibility and strong control over trusted tools matter more than signatures for known-malicious files.
Instead of writing malware that security tools can signature-match and quarantine, attackers use PowerShell, WMI, certutil, and other tools that IT teams run every day. Your antivirus trusts them. Your allowlists approve them. Your SIEM expects them. CISA's own red teams "frequently use publicly known LOTL techniques for execution, persistence, lateral movement, discovery, and credential access with network defenders rarely finding their activity," per the 2025 guidance. To understand why this works so well, start with the specific techniques and tools attackers rely on.
Techniques and Tools Behind Living Off the Land Attacks
LOTL attacks share a common set of building blocks. Understanding these components helps separate routine administration from active intrusion.
- Living Off the Land Binaries (LOLBins): These are native, OS-signed executables that attackers repurpose. The LOLBAS Project, referenced directly by CISA, catalogs Windows LOLBins, while GTFOBins covers Unix/Linux and LOOBins covers macOS.
- Valid Credentials: LOTL rarely works without stolen or compromised accounts. Volt Typhoon used compromised domain admin credentials for RDP lateral movement across victim networks.
- Fileless Execution: Payloads run in memory or through existing software without writing executable files to disk. This helps attackers avoid antivirus signatures. A SANS-documented technique uses PowerShell's Get-Clipboard combined with Invoke-Expression to execute code that avoids IOC.
- System Binary Proxy Execution: Classified under MITRE T1218, this involves using trusted, signed binaries to execute malicious payloads. The binary is legitimate, often Microsoft-signed, but the payload it launches is not.
- Command and Scripting Interpreters: PowerShell (T1059.001), Windows Command Shell (T1059.003), and Unix shells (T1059.004) give attackers full scripting capabilities through tools your enterprise depends on.
Each of these techniques centers on a small set of binaries that appear in campaign after campaign.
Common LOLBins and their Malicious Uses
The table below maps the most frequently abused LOLBins to their intended function and how attackers repurpose them.
| Binary | Legitimate Purpose | Attacker Abuse | MITRE ID |
| PowerShell | System administration, automation | In-memory code execution, credential harvesting | |
| WMI / WMIC | Remote system management, inventory | Remote process execution, persistence | |
| certutil.exe | Certificate management | File downloads, Base64 encoding/decoding | |
| rundll32.exe | Loading DLL functions | Proxy execution of malicious DLLs | |
| mshta.exe | Running HTML Applications | Execute malicious HTA payloads from remote URLs | |
| netsh.exe | Network configuration | Port forwarding, firewall rule modification |
These components combine to create attack chains that are difficult to spot if your tools rely mainly on known-bad signatures or binary reputation. The next step is understanding how attackers string them together.
How Living Off the Land Attacks Work
A typical LOTL attack chain unfolds in stages, each using native tools that belong on the system.
Stage 1: Initial Access
The attacker gains entry through a phishing email, exploited vulnerability, or compromised credential. Volt Typhoon exploited public-facing network appliances. APT28's "Nearest Neighbor" campaign used Wi-Fi near the target to gain initial access.
Stage 2: Execution
Rather than dropping a custom binary, the attacker invokes native interpreters. PowerShell runs code in memory. WMI spawns processes remotely. The Black Basta ransomware operation used WMI via Cobalt Strike to deploy payloads across victim networks, chaining native system tools for lateral execution.
Stage 3: Discovery and Credential Access
Tools like ntdsutil extract Active Directory databases. CISA documented Volt Typhoon running the command ntdsutil "ac i ntds" ifm "create full C:\Windows\Temp\pro" to dump credentials. PowerShell queries event logs. net localgroup administrators maps privilege boundaries.
Stage 4: Lateral Movement
RDP sessions use valid admin credentials. SMB transfers files between hosts. netsh creates port proxy rules to redirect traffic. Each step uses a tool your IT team could run for a legitimate reason.
Stage 5: Persistence and Impact
Scheduled tasks, WMI subscriptions, and registry modifications maintain access. In ransomware operations, the encryptor itself may be the only non-native tool in the chain, deployed only after the attacker has used LOLBins to map, access, and stage every target.
The entire process maps across multiple ATT&CK tactics, from execution through defense evasion, persistence, credential access, command and control, and lateral movement. Breaking LOTL into stages makes it clear why security controls miss it so often: the attacker's real advantage comes from how your environment is built to trust these tools.
Why Living Off the Land Attacks Succeed
LOTL attacks succeed because they exploit architectural assumptions built into your security stack and operational workflows.
- Trusted by design. LOLBins carry valid file hashes and digital signatures issued by the operating system vendor. CISA states these "trusted attributes can mislead network defenders" into thinking they are safe for all users.
- Invisible to signatures. A peer-reviewed study in Cybersecurity documents a specific bypass: attackers insert special characters into command-line code that the Windows interpreter removes at runtime, causing the executed command to differ from what rules evaluate.
- Hidden in default logging. CISA confirms that LOTL techniques deliberately "limit activity in logs". If you are running default Windows logging, you lack command-line arguments, PowerShell script block content, and process ancestry chains.
- Amplified by alert fatigue. Broad LOLBin rules generate high false positive volume. CISA's advisory on Russian GRU targeting warns that "more heuristics are needed" for effective hunting for LOTL binaries to avoid being overwhelmed by false positives. When analysts stop trusting alerts, LOTL operators gain more room to operate.
- Extended by dwell time. Volt Typhoon persisted for an extended period. Every day without identification is another day for reconnaissance, credential harvesting, and pre-positioning.
Those conditions make LOTL hard to find even in mature environments. Real-world campaigns show how these advantages play out in practice.
Real-World LOTL Campaigns: Nation-State and Ransomware Operators
Understanding how real adversaries chain LOLBins together makes the threat concrete.
- Volt Typhoon (PRC) maintained access to U.S. communications, energy, transportation, and water systems over a prolonged period. Documented tools include
wmic, ntdsutil, netsh, PowerShell, and RDP, all documented in the Volt Typhoon profile. - APT28 / Fancy Bear (Russia/GRU) executed the Nearest Neighbor campaign over multiple years, using
reg saveto dump SAM hives,vssadminfor NTDS.dit extraction,netsh portproxyfor internal proxies, and PowerShell for credential access and data compression before exfiltration. - FIN7 uses PowerShell with custom obfuscation, POWERTRASH, a modified PowerSploit,
rundll32.exefor DLL execution, and valid accounts per the FIN7 profile across financial targets.
The pattern across these campaigns is consistent: trusted tools, valid credentials, and minimal custom code. That pattern also reveals the specific challenges defenders face.
Challenges in Stopping Living Off the Land Attacks
Even organizations with mature security programs struggle against LOTL because the techniques exploit gaps that traditional tools were not designed to address.
- Context collapse at scale. The same PowerShell command can represent routine administration or active intrusion. In ICS/OT environments, SANS documents the extreme form: adversaries changed HMIs and reprogrammed controllers using standard engineering workflows.
- SIEM structural failures. SIEMs fail against LOTL through log coverage gaps, such as no command-line arguments in default configs, rule brittleness, such as static pattern matching against behaviors that match no known-malicious pattern, and false positive paralysis.
- Cloud and hybrid visibility gaps. SANS identifies that attackers are now abusing cloud tools to gain administrative privileges and move laterally between cloud environments. If your defenses only cover Windows endpoints, they are not enough.
- Nation-state and ransomware convergence. MITRE ATT&CK cross-actor mapping shows that nation-state actors, including Volt Typhoon and APT28, and ransomware operators, including Black Basta and FIN7, now use nearly identical techniques: PowerShell, RDP, WMI, ntdsutil, and system binary proxy execution. You cannot silo your defenses by threat actor type.
These challenges carry directly into day-to-day operations. Overcoming them starts with knowing what LOTL activity looks like in your telemetry.
How to Detect Living Off the Land Attacks
LOTL activity lacks traditional indicators of compromise. Detection requires shifting focus from what is running to how and why it is running, using behavioral context rather than file reputation.
Behavioral Signals to Monitor
CISA's 2025 joint guidance recommends applying heuristics like time-of-day, user role, and process ancestry to separate malicious from routine LOLBin usage. High-value signals include:
- PowerShell or cmd.exe spawned by Office applications (Word, Excel, Outlook)
ntdsutil or vssadminexecuted by non-administrative accountscertutilused for file downloads rather than certificate managementnetshcreating port proxy rules or modifying firewall configurations outside change windowsrundll32.exeloading DLLs from temporary or user-writable directories- Scheduled task or WMI subscription creation outside maintenance windows
SANS advocates a flexible baseline approach using PowerShell regular expressions applied to event log fields, refining rules iteratively as you learn your environment's normal patterns. Those signals only surface if the right telemetry is feeding your analysis.
Log Sources that Matter
Default logging configurations miss most LOTL activity. CISA prioritizes enabling the following:
- PowerShell ScriptBlock and Module Logging
- Command-line process creation auditing (Event ID 4688 with arguments)
- Sysmon for process creation, network connections, and file events
- WMI activity logging (Event IDs 5857–5861)
Aggregate these logs in a centralized, write-once location and apply user and entity behavior analytics (UEBA) to surface anomalies against established baselines.
Even with the right telemetry, teams often make avoidable mistakes that undermine their detection posture.
Common Mistakes in Living Off the Land Defense
Security teams that recognize the LOTL threat still undermine their own defenses through recurring operational gaps.
- Blanket allow policies for LOLBins. Trusting that legitimate IT tools are safe to allow globally expands the attack surface. CISA's 2025 guidance explicitly warns against this.
- Running default logging configurations. If you have not enabled PowerShell ScriptBlock Logging, Module Logging, command-line process auditing, and WMI activity logging, you lack the telemetry LOTL analysis requires.
- Treating absence of alerts as absence of compromise. Silence does not equal safety.
- Applying IT incident response playbooks to ICS/OT. SANS warns that IT controls can cause harm when applied directly to industrial environments.
- Substituting tooling for analyst capability. Tools augment but cannot replace analyst skill for LOTL context evaluation. Building rules without investing in threat hunting leaves you with noise, not defense.
Avoiding those mistakes starts with controls that improve visibility, reduce trust abuse, and give analysts more context.
How to Prevent Living Off the Land Attacks
Prevention focuses on reducing the attack surface that LOTL exploits: overly permissive tool access, weak authentication, and insufficient constraints on scripting environments.
- Enable centralized, verbose logging. CISA's top priority is broad logging aggregated in an out-of-band, write-once location. Without verbose telemetry covering PowerShell, process creation, and WMI activity, behavioral analysis has nothing to work with.
- Deploy application allowlisting. Use AppLocker or Windows Defender Application Control, WDAC, to restrict LOLBin execution by user, path, and publisher. Block or restrict
mshta.exe, psexec.exe, certutil.exe, wmic.exe, andrundll32.exeexcept for approved administrative accounts. Start in audit mode before enforcing. - Enforce PowerShell Constrained Language Mode. CLM restricts advanced scripting capabilities, blocking .NET methods like
[Convert]::FromBase64String()while preserving basic cmdlet functionality. Combine it withAllSignedexecution policy and Just Enough Administration, or JEA. - Implement phishing-resistant MFA. CISA lists this as an immediate priority for defending against LOTL. Enforce MFA specifically for RDP, VPN, and remote monitoring and management (RMM) software access per CISA RMM guidance.
- Adopt Zero Trust architecture. CISA and NSA strongly recommend Zero Trust as a long-term strategy. LOTL succeeds because perimeter defenses implicitly trust internal tools and authenticated sessions. Zero Trust removes that implicit trust through microsegmentation, least-privilege access, and continuous verification.
These practices raise the cost of LOTL for an attacker. To enforce them at machine speed, you need a platform built around behavioral context.
Protect Your Endpoint
See how AI-powered endpoint security from SentinelOne can help you prevent, detect, and respond to cyber threats in real time.
Get a DemoKey Takeaways
Living off the land attacks abuse trusted, native system tools to evade signature-based defenses. Nation-state actors and ransomware operators now use similar LOTL techniques across Windows, Linux, cloud, and OT environments.
To stop them, you need verbose logging, behavioral baselines, application control, Zero Trust architecture, and behavioral AI cybersecurity that distinguishes malicious intent from legitimate tool usage. Platforms that correlate full attack chains autonomously, like Singularity, replace the manual investigation burden that LOTL exploits.
FAQs
A living off the land attack is a class of adversary behavior where attackers use native, pre-installed system tools and trusted binaries, rather than custom malware, to carry out their objectives.
By relying on tools like PowerShell, WMI, and certutil that are already present and approved on the target system, attackers blend in with normal administrative activity and avoid triggering signature-based security controls.
LOTL focuses on the source of tools, abusing legitimate, pre-installed system binaries. Fileless malware focuses on the method of execution, avoiding writing files to disk. They often overlap: an attacker can run a fileless PowerShell payload using a native OS binary.
However, fileless attacks may use custom tools, and LOTL may involve writing files to disk through trusted, signed binaries like those categorized under MITRE ATT&CK T1218.
PowerShell (T1059.001), WMI/WMIC (T1047), rundll32.exe (T1218.011), certutil.exe (T1105), and cmd.exe (T1059.003) appear frequently across documented campaigns. Attackers favor these binaries because they are pre-installed, digitally signed by the OS vendor, and capable of executing code, downloading files, or spawning processes without raising alerts.
The LOLBAS Project maintains the authoritative catalog for Windows, while GTFOBins covers Linux and LOOBins covers macOS.
Legacy antivirus relying on signatures cannot, because LOLBins carry valid OS-vendor hashes and digital signatures. Behavioral AI-based endpoint protection can, by tracking process relationships, command-line arguments, and deviations from established baselines in real time.
Your platform must correlate process chains across endpoint, identity systems, and network telemetry to find LOTL behavior. Without that cross-domain visibility, individual LOTL events appear benign.
Start with behavioral context, not binary names. Hunt for PowerShell spawned from Office applications, ntdsutil execution by non-admin accounts, or certutil used for file downloads. CISA recommends using additional heuristics, such as time-of-day, user role, and process ancestry, to filter results.
SANS advocates a flexible baseline approach using regular expressions applied to event log fields. Refine rules iteratively as you learn your environment's normal patterns.
Custom malware leaves unique artifacts that threat intelligence teams can fingerprint, attribute, and build signatures for. LOTL reduces that risk because every command uses a tool that belongs on the system.
CISA confirms that PRC actors use LOTL specifically to "blend in with normal system and network activities, avoid identification by network defenses, and limit the amount of activity that is captured in common logging configurations."


