Speaker: Lee Lawson, Special Operation Resercher, Secureworks Counter Threat Unit
Recorded: June 20, 2017
Duration: 60 Mins
What you will learn:
- What PowerShell is and how it is used in “living off the land” attacks
- Why built-in tools like PowerShell are so attractive to threat actors
- Examples of malicious PowerShell use
- How to defend your organization against common methods to evade prevention and detection
In a recent Secureworks engagement, 98.5% of the 3,477 commands executed by threat actors were native to the Windows operating system.
PowerShell is a popular tool that Microsoft has been including with the Windows OS since 2009, but malicious PowerShell use is rivaling ransomware in popularity with threat actors. Security products focused on preventing endpoint threats are often not enough to differentiate legitimate from malicious PowerShell use. Join us for a discussion of why PowerShell is so risky, how Secureworks researchers identify PowerShell threats, and how you can defend your organization.