When Defense Tools Turn Adversarial: Detecting the Misuse of Velociraptor in Modern Attack Chains
← Back to Labs
← Volver a Labs
Medium
CyberCrime, LOLBin
Command and Control, Defense Evasion, Execution, Privilege Escalation
EDR

When Defense Tools Turn Adversarial: Detecting the Misuse of Velociraptor in Modern Attack Chains

We are witnessing a significant evolution in adversary tactics: threat actors are actively leveraging legitimate, open-source incident response tools like Velociraptor for malicious purposes, effectively adopting a "misuse pattern" instead of relying solely on custom malware. This evolving tactic highlights the need for vigilance in monitoring and detecting unauthorized Velociraptor use to effectively intercept and mitigate misuse before it leads to further compromise or ransomware deployment.

labs correlati

Contacts

Get in touch with us

Contact Us
chevron-right