Blog | G5 Cyber Security

8 Legit Tools and Utilities That Cybercriminals Commonly Misuse

Cybercriminals increasingly use tools that are already preinstalled on targeted systems to carry out cyberattacks. Such tools allow attackers to hide their activities in a sea of legitimate traffic. This makes it harder for defenders to spot malicious activity and makes attack attribution much more difficult. Here are eight of the mostly commonly abused legitimate utilities and tools and tools used by cybercriminals, according to security experts at Positive Technologies. Back to Mail Online home: Show us what you think you need to do to fight cybercrime. Back to the page you came from.”]

Source: https://www.darkreading.com/attacks-breaches/8-legit-tools-and-utilities-that-cybercriminals-commonly-misuse

Exit mobile version