Which Binaries Should Be Restricted to Help Mitigate LotL Attacks?
book
Article ID: 292158
calendar_today
Updated On:
Products
Carbon Black Cloud Endpoint Standard (formerly Cb Defense)
Issue/Introduction
Which binaries and scripts are typically exploited by threat actors and should be restricted to help mitigate Living off the Land Binary (LotL/LoLBins) attacks?
Environment
Carbon Black Cloud
Endpoint Standard
Carbon Black Cloud Windows Sensor: All Supported Versions
Microsoft Windows: All Supported Versions
Resolution
Threat actors perform Living off the land (LotL) attacks when they leverage legitimate executables such as administrative and third-party tools to perform detrimental actions against an individual or an organization.
Many times those administrative tools are already present in the target machine, which makes the attack exponentially easy to accomplish.
As a lot of these tools have been signed by Microsoft or third-party reputable software vendors, it makes it challenging to prevent their execution.
As such, Carbon Black recommends restricting the execution of the binaries and scripts listed below by only those roles that absolutely require them to perform their daily operations:
**\7z*.exe ← May require careful testing as 7zip is widely used by users
**\aescrypt.exe
**\gpg.exe
**\nsudo.exe
**\megasync.exe
**\paexec.exe
**clone.exe
Limiting execution from temporary directories (%temp%), user's application data (%appdata%) directories, as well as Windows's Public (C:\Users\Public) subfolders will further mitigate attacks
Unless absolutely required, block SMB listening services and ports (445, 137, 138, and 139) at the host/client level will help prevent lateral movement
It is best security practice not to expose SMB, RDP or other services to the open internet, consult your perimeter firewall vendor for configuration steps and recommendations
Legacy operating systems should be decommissioned, in those rare cases where end-of-life OSs are required to conduct business, they should be isolated from the rest of the production machines
Implement a regular cadence for security updates and patches, including rebooting as often restarting the endpoints is required for kernel patches to take effect
Ensure deploying the latest Carbon Black Cloud sensor as newer versions leverage advanced prevention rules after proper vetting
Restricting the execution of these binaries should be part of a multi-layer security posture and not the only way to prevent them, particularly when attackers often rename these binaries
Additional Information
Carbon Black strongly recommends testing prior to rolling out rules into production. Unless extensive testing is performed prior to blocking LotL binaries and scripts, deploying these restrictive rules into production may break the operations of maintenance, administrative, backup software, etc
Restricting execution of LotL binaries may generate a higher number of alerts
Following the "Defense in Depth" principle, system administrators should leverage the built in sensor functionality, such as the host-based firewall, IDS, LiveQuery to retrieve unwanted ports open, watchlists, and consider adding a robust Application Control layer alongside XDR.