An attacker’s toolchest: Living off the land

From gdatasoftware.com

if you’ve been keeping up with the information security world, you’ve certainly heard that recent ransomware attacks and other advanced persistent threats are sometimes using special kind of tools. But for the most part, the tools will be very familiar to you.

The tools used by an attacker are showing what a determined cybercriminal group with a lot of patience and skills can do. The question a lot of people always ask to me is what kind of tools have been used in which kind of attack.

Read more…