Sunday, 11 Jan 2026
  • About us
  • Contact
  • History
  • My Interests
  • Privacy Policy
Nexpressdaily.com
  • Home
  • Politics
  • Finance
  • Health
  • Technology
  • Travel
  • World
  • šŸ”„
  • Politics
  • Technology
  • Travel
  • World
  • Finance
  • Health
Font ResizerAa
Nexpressdaily.comNexpressdaily.com
  • My Saves
  • My Interests
  • My Feed
  • History
  • Travel
  • Finance
  • Politics
  • Health
  • Technology
  • World
Search
  • Pages
    • Home
    • Blog Index
    • Contact Us
    • Search Page
    • 404 Page
  • Personalized
    • My Feed
    • My Saves
    • My Interests
    • History
  • Categories
    • Finance
    • Politics
    • Technology
    • Travel
    • Health
    • World
Have an existing account? Sign In
Follow US
Ā© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Technology

Cybercriminals love this ancient Windows tool, but a little-known CLI utility is their new secret weapon

Nexpressdaily
Last updated: June 8, 2025 8:05 am
Nexpressdaily
Share
SHARE


  • Netsh.exe is the most abused Windows tool, and it still hides in plain sight
  • PowerShell shows up on 73% of endpoints, not just in admin hands
  • WMIC’s surprising comeback shows attackers favor tools no one’s watching anymore

A new analysis of 700,000 security incidents has revealed just how extensively cybercriminals exploit trusted Microsoft tools to breach systems undetected.

While the trend of attackers using native utilities, known as Living off the Land (LOTL) tactics, is not new, the latest data from Bitdefender’s GravityZone platform suggests it’s even more widespread than previously believed.

A staggering 84% of high-severity attacks involved the use of legitimate system binaries already present on machines. This undermines the effectiveness of conventional defenses, even those marketed as the best antivirus or best malware protection.


You may like

Some of the tools most commonly abused will be very familiar to system administrators, including powershell.exe and wscript.exe.

However, one tool unexpectedly emerged at the top: netsh.exe. A command-line utility for managing network configuration, netsh.exe was found in a third of major attacks – and while it is still used for firewall and interface management, its frequent appearance in attack chains suggests its potential for misuse is underestimated.

PowerShell remains a key component of both legitimate operations and malicious activity – although 96% of organizations use PowerShell, it was found running on 73% of endpoints, well beyond the scope of what would be expected from administrative use alone.

Bitdefender found, ā€œthird-party applications running PowerShell code without a visible interfaceā€ were a common cause.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

This dual-use nature makes detection difficult, especially for tools not backed by behavior-aware engines.

It raises questions about whether the best EPP solutions are adequately tuned to account for this blurred line between normal and nefarious use.

Another surprising finding was the continued use of wmic.exe, a tool that Microsoft has deprecated.

Despite its age, the analysis shows it is still widely present in environments, often invoked by software seeking system information. It is particularly attractive when attackers are trying to blend in because of its legitimate appearance.

To tackle this issue, Bitdefender developed PHASR (Proactive Hardening and Attack Surface Reduction). This tool employs a targeted approach that goes beyond simply disabling tools.

ā€œPHASR goes beyond blocking entire tools, it also monitors and stops the specific actions attackers use within them,ā€ the company said.

Still, this approach is not without trade-offs. The fundamental dilemma, ā€œcan’t live with them, can’t live without themā€, remains unresolved.

You might also like

Share This Article
Email Copy Link Print
Previous Article Queensland fire crews work to rescue man in his 80s stuck up to his neck in silo of fertiliser | Australia news
Next Article Inside the Trump-Musk Breakup – The Atlantic

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
XFollow
InstagramFollow
LinkedInFollow
MediumFollow
QuoraFollow
- Advertisement -
Ad imageAd image

Popular Posts

Trump claims to soften immigration policy without action

IE 11 is not supported. For an optimal experience visit our site on another browser.ā€˜Makes…

By Nexpressdaily

No rain forecast as crews battle Flin Flon wildfire

By The Staff The Canadian Press Posted May 31, 2025 8:20 am 1 min read…

By Nexpressdaily

A U.S. startup is selling your hacked, stolen data to anyone with $50

When you imagine personal data stolen on the internet, like your address, phone number, internet…

By Nexpressdaily

You Might Also Like

Technology

Meta asks judge to throw out antitrust case mid-trial

By Nexpressdaily
Technology

How to set up a WhatsApp account without Facebook or Instagram

By Nexpressdaily
Technology

Epic is giving away Dead Island 2 this week. Grab it and save $50!

By Nexpressdaily
Technology

Ninja’s New Ice Cream Machine Makes Swirling Soft Serve, and We Tried It

By Nexpressdaily
Nexpressdaily.com
Facebook Twitter Youtube Rss Medium

About US

NexpressDaily.com is a leading digital news platform committed to delivering timely, accurate, and unbiased news from around the world. From politics and business to technology, sports, health, and entertainment – we cover the stories that matter most. Stay connected with real-time updates, expert insights, and trusted journalism, all in one place.

Top Categories
  • World
  • Finance
  • Politics
  • Tech
  • Health
  • Travel
Usefull Links
  • About us
  • Contact
  • History
  • My Interests
  • Privacy Policy

Ā© Nexpressdaily. All Rights Reserved.

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?