Windows rife with executables

Hackers use a variety of techniques to infiltrate systems and make off with data, but one of the more effective approaches is to use the system against itself.

There are a number of executables residing within the Windows operating system (OS), for instance, that can be used by an enterprising hacker to make off with a wide range of data.

Since these techniques leverage executables that are native to the OS, they almost never trigger defensive mechanisms like Windows Defender or the company's anti-malware software suite.

Living Off The Land Binaries

Collectively, these files are referred to as LOLBins, which is shorthand for 'Living Off The Land Binaries'. By most estimates, the current iteration of Windows has about a dozen of them that could be exploited.

Recently, that number increased by +1 as security researchers discovered a sneaky, unorthodox way a hacker could use the Name/Finger network communication protocol to exfiltrate files from a network.

Name/Finger communications protocol

Essentially, if a hacker gains access to your system, he can use the Name/Finger communications protocol as a rudimentary command and control module. Then, they can send commands to move, copy or delete files without alerting Windows Defender or other security protocols you may have running.

Researchers developed a pair of proof of concept scripts, which prove that his technique is viable. However, to this point, Microsoft has not responded, nor given any indication when a fix might be forthcoming.

As mentioned, the Name/Finger protocol certainly has plenty of company, as there are a number of other binaries in the OS that are just as vulnerable. That oddly includes Windows Defender itself, which can be highjacked via the command lines and forced to download files.

Our perspective

These types of attacks are notoriously difficult to detect and prevent, so the best you can do to safeguard yourself and your sensitive data is to be mindful of the possibilities.

~ As Hill Street Blues' Sgt. Esterhaus always advised: "Hey, let's be careful out there! " ~

 

By Denis Wilson and Melissa Stockwell

Thanks for reading this short post. For more tips on thriving with small business technology, check out the other blog posts at DWPIA Blogs. You can also find me on LinkedIn, Facebook, and Twitter.

Cybersecurity Expert, Small Business Technology Consultant, Managed Services Provider, Managed IT SupportI'm Denis Wilson, President and Principal Consultant for DWP Information Architects. We build people/process/technology solutions to create better business outcomes for smaller enterprises in Los Angeles. We have created cost-effective office productivity and out-sourced service solutions for over 20 years, focusing principally on manufacturing, professional services, and healthcare.  Our hallmarks are cloud and on-premises network reliability, cost-effective cybersecurity, and livable small business regulatory compliance.

I am also a published author and speaker, working extensively with business and professional associations to provide small business technology education programs. Contact me if you would like me to speak at your association