How Hackers Exploit Your Windows Tools, Part 1: The PowerShell Risk
Speaker: Lee Lawson, Special Operation Resercher, SecureWorks Counter Threat Unit
Available : Live online
Duration: 60 minutes
In a recent SecureWorks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.
PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivalling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use.
In the first webcast of a two-part series on how threat actors are exploiting Windows tools in “living off the land” attacks, SecureWorks Counter Threat Unit - Special Operations Researcher, Lee Lawson, will discuss why PowerShell is so risky, how SecureWorks researchers identify PowerShell threats, and how you can defend your organisation.
You Will Learn:
- What PowerShell is and how it is used in “living off the land” attacks
- Why built-in tools like PowerShell are so attractive to threat actors
- Examples of malicious PowerShell use
- How to defend your organisation against common methods to evade prevention and detection
Look out for part two in this series in the near future, which discusses how threat actors are exploiting WMI.Register Here