Living off the Land: Your Legitimate Tools Have Become Your Worst Attackers
- Apr 3
- 2 min read
In 2026, the majority of sophisticated attacks no longer drop any malware on your systems. Attackers use your admin consoles, your OAuth flows, your official installers. This is “Living off the Land” (LotL) — and it bypasses classic detections.
4 Q1 2026 incidents that point to the same trend
1. Stryker (March). The Iranian Handala group steals a single credential, accesses Microsoft Intune (the legitimate device management tool), and wipes 80,000 machines across 79 countries. Not a single malicious executable dropped. 2. MuddyWater. Hijacks Microsoft Teams to steal credentials, then displays a fake ransomware banner as a diversion (false flag). Your collaborators click on an internal Teams link — the authentication looks normal. 3. OAuth abuse explosion. Attackers no longer need classic phishing. They create third-party OAuth applications that request extended permissions on your mailboxes, drives, calendars. Your users click “Authorize” — it's legal, signed, and invisible to EDRs. 4. DAEMON Tools. Compromise of the official installer distributed by the vendor. Your teams install signed software, validated by your antivirus — which contains a backdoor.
Why your EDRs no longer see anything
EDRs were designed to detect a suspicious binary. But when the attacker uses: • A legitimate tool already signed by Microsoft (Intune, Teams, PowerShell) • An authentic credential (stolen but valid) • An OAuth session approved by the user themselves There is nothing to detect at the binary level. Behaviors look normal. The legitimate noise hides the malicious signal.
5 defensive measures to apply this week
1. Hunt third-party OAuth permissions. Audit every OAuth application connected to your Microsoft 365 / Google Workspace. Block permissions unused for 90+ days. 2. Restrict admin tools by identity AND network. Microsoft Intune, Azure AD, AWS console: mandatory MFA + IP restrictions + admin session monitoring with alerts. 3. Monitor behaviors, not binaries. Migrate detection rules to UEBA (User Entity Behavior Analytics) that flags pattern deviations, not executables. 4. Verify installer integrity. Implement hash + signature validation for all installed software. Reject updates that don't match the usual chain of trust. 5. Reduce the time between credential leak and revocation. Connect your directory to dark web feeds to automatically revoke credentials that appear in circulation.
Conclusion
The era where “detecting malware” = “detecting an attack” is over. In 2026, attackers play in your courtyard, with your tools, in plain sight. Modern defense is no longer a question of signatures — it's a question of behavioral context and privilege reduction. Without visibility into the real use of your legitimate tools, you defend nothing. You just validate after the fact.
→ Discover how FortaRisks correlates CTI and behaviors to detect LotL: https://www.fortarisks.com/en/decouvrir
Comments