Defense evasion
This step of the kill chain refers to the fact that attackers may leverage different techniques to bypass prevention mechanisms and avoid being detected by security systems and the blue team. It is a key component of any threat actor's campaign.
Now, let's look at one very common defense evasion technique that's used by different malware – the signed binary proxy execution technique.
T1218 – Signed binary proxy execution
As tools are becoming more and more sensitive, editors must be careful while whitelisting legitimate OSs and application behavior, processes, and files as this may open a window of opportunities for the attackers. For this technique, digitally signed Microsoft binaries are leveraged on the Windows operating system to avoid prevention and detection. This is also known as Living Off the Land Binaries and Scripts (LOLBAS). The following GitHub project documents all of these: https://github.com/LOLBAS-Project/LOLBAS...