Close Menu
Mobile SpecsMobile Specs

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025
    Facebook X (Twitter) Instagram
    Mobile SpecsMobile Specs
    • Home
    • 5G Phones
    • Android vs iOS
    • Brands
    • Budget Phones
    • Compare
    • Flagships
    • Gaming Phones
    • New Launches
    Mobile SpecsMobile Specs
    Home»New Launches»Cyber ​​criminals like this ancient Windows Tool, but a small utility of CLI is their new secret weapon
    New Launches

    Cyber ​​criminals like this ancient Windows Tool, but a small utility of CLI is their new secret weapon

    mobile specsBy mobile specsJune 8, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Cyber ​​criminals like this ancient Windows Tool, but a small utility of CLI is their new secret weapon
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Netsh.Ex is the most abusive tool of Windows, and it still hides in a simple look
    • Power Shell appears at 73 % closing places not only in the admin hand
    • WMIC’s amazing return shows that the attackers are in favor of the tools

    A new analysis of 700,000 security incidents has revealed how cyber criminals exploit Microsoft tools widely, which violates the violation system.

    Although the trend of invaders who uses the ancestral efficacy, called the Living of the Land (Loot L), is not new, the latest data from the Bit Defnder’s gravity zone platform suggests that it is much wider than the previous idea.

    An amazing 84 % high -intensity attacks included the use of binarys already existing on machines. This offers the effectiveness of traditional defense, even when they marketing the best anti -virus or the best malware protection.

    You can like

    Some tools that usually abuse will be very familiar with system administrators, including PowerSheel.Cax and WScript.exe.

    However, a tool unexpectedly came from above: Netsh.X. The command line’s utility to manage the network formation, Natish.com was found in a third major attacks – and when it is still used for firewalls and interface management, its appearance in the attack chains shows that its abuse is less likely to be considered less.

    Power shells have become a key component of both legitimate operations and malicious activity – although 96 % of organizations use power shells, but it was found to be 73 % of the closing locations, more than its scope, what would be expected only with administrative use.

    Butt Defender found, “Third -party applications are running power shell codes without interface” was a common reason.

    Sign up to all the high news, feedback, feedback, features and guidance in the TECH TACKANDER Pro Newsletter for your business to succeed!

    It makes it difficult to detect the nature of the dual use, especially for the tools that do not support engines familiar with behavior.

    This raises questions as to whether the best EPP solutions are properly prepared for calculating this matte between common and blasphemous use.

    Another amazing search was the constant use of WMIC.Exe, which Microsoft has outdated.

    Despite her age, analysis shows that it is still widespread in the environment, often demanded by software to obtain system information. It is especially attractive when the invaders are trying to mix because of its legitimate appearance.

    To tackle this problem, Bit Defender developed PHSR (active hardness and attack levels of attack). The device uses a target approach that is only beyond disabling the tools.

    The company said, “PhasR is ahead of blocking the entire tools, it also monitors and prevents specific measures used within the invaders.”

    Nevertheless, this approach is not without trade. The basic dilemma, “cannot live with them, cannot live without them”, the solution is not demanded.

    You like too

    Ancient CLI criminals Cyber secret small tool utility weapon Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleThe date of the Iqoo Z10 Light 5G India launch is set on June 18. Design, teasing the battery size
    Next Article The ancestral iOS app is broken with iOS 18.5 update but here are some corrections you can try
    mobile specs
    • Website

    Related Posts

    Compare

    Can’t wait for Virgin Rivers Season 7? Check out the new Netflix Christmas movie My Secret Santa – you won’t be disappointed

    December 3, 2025
    Compare

    India has reportedly asked smartphone makers to pre-load state-owned cyber safety app Sanchar Sati on new devices.

    December 1, 2025
    Compare

    Arturia’s Astrolabe 37 Krams 44 synths in one small keyboard

    November 25, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    Compare

    Honor Magic 8 Lite Review – gsmarena.com Test

    mobile specsDecember 8, 2025
    Compare

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    mobile specsDecember 8, 2025
    Compare

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    mobile specsDecember 8, 2025

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Redmi K90 Pro Max debuts with Snapdragon 8 Elite Gen 5 SoC and a Bose 2.1-channel speaker setup

    October 23, 20255 Views

    GPT5 can be here in this month-there are five features we hope

    July 5, 20254 Views

    Gut Hub spreads about the GPT5 model before the official announcement

    August 7, 20252 Views
    Our Picks

    Honor Magic 8 Lite Review – gsmarena.com Test

    December 8, 2025

    Google Project Aura hands-on: Android XR’s biggest strength is in apps

    December 8, 2025

    Bussel PowerClean Fur Finder Review: This budget-friendly cordless vacuum is simple yet effective

    December 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    • Disclaimer
    © 2026 MobileSpecs. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.