Close Menu
TechurzTechurz
    What's Hot

    This young startup is taking on a fragrance industry that hasn’t changed in a almost half century

    May 21, 2026

    Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement

    May 21, 2026

    Beauty booking startup Fresha hits $1 billion valuation with KKR backing

    May 21, 2026
    Facebook X (Twitter) Instagram
    Tech Pulse
    • This young startup is taking on a fragrance industry that hasn’t changed in a almost half century
    • Maka Kids is redefining kids’ screen time with a streaming app optimized for well-being, not engagement
    • Beauty booking startup Fresha hits $1 billion valuation with KKR backing
    • General Catalyst just led a $63M bet on India’s travel payments market
    • Clouted wants to take the guesswork out of making short videos go viral
    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    TechurzTechurz
    • Home
    • Tech Pulse
    • Future Tech
    • AI Systems
    • Cyber Reality
    • Disruption Lab
    • Signals
    TechurzTechurz
    Home - Guides - Cybercriminals love this ancient Windows tool, but a little-known CLI utility is their new secret weapon
    Guides

    Cybercriminals love this ancient Windows tool, but a little-known CLI utility is their new secret weapon

    TechurzBy TechurzJune 7, 2025Updated:May 12, 2026No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Malware attack virus alert , malicious software infection , cyber security awareness training to protect business
    Share
    Facebook Twitter LinkedIn Pinterest Email


    • Netsh.exe is the most abused Windows tool, and it still hides in plain sight
    • PowerShell shows up on 73% of endpoints, not just in admin hands
    • WMIC’s surprising comeback shows attackers favor tools no one’s watching anymore

    A new analysis of 700,000 security incidents has revealed just how extensively cybercriminals exploit trusted Microsoft tools to breach systems undetected.

    While the trend of attackers using native utilities, known as Living off the Land (LOTL) tactics, is not new, the latest data from Bitdefender’s GravityZone platform suggests it’s even more widespread than previously believed.

    A staggering 84% of high-severity attacks involved the use of legitimate system binaries already present on machines. This undermines the effectiveness of conventional defenses, even those marketed as the best antivirus or best malware protection.


    You may like

    Some of the tools most commonly abused will be very familiar to system administrators, including powershell.exe and wscript.exe.

    However, one tool unexpectedly emerged at the top: netsh.exe. A command-line utility for managing network configuration, netsh.exe was found in a third of major attacks – and while it is still used for firewall and interface management, its frequent appearance in attack chains suggests its potential for misuse is underestimated.

    PowerShell remains a key component of both legitimate operations and malicious activity – although 96% of organizations use PowerShell, it was found running on 73% of endpoints, well beyond the scope of what would be expected from administrative use alone.

    Bitdefender found, ā€œthird-party applications running PowerShell code without a visible interfaceā€ were a common cause.

    Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

    This dual-use nature makes detection difficult, especially for tools not backed by behavior-aware engines.

    It raises questions about whether the best EPP solutions are adequately tuned to account for this blurred line between normal and nefarious use.

    Another surprising finding was the continued use of wmic.exe, a tool that Microsoft has deprecated.

    Despite its age, the analysis shows it is still widely present in environments, often invoked by software seeking system information. It is particularly attractive when attackers are trying to blend in because of its legitimate appearance.

    To tackle this issue, Bitdefender developed PHASR (Proactive Hardening and Attack Surface Reduction). This tool employs a targeted approach that goes beyond simply disabling tools.

    ā€œPHASR goes beyond blocking entire tools, it also monitors and stops the specific actions attackers use within them,ā€ the company said.

    Still, this approach is not without trade-offs. The fundamental dilemma, ā€œcan’t live with them, can’t live without themā€, remains unresolved.

    You might also like

    Ancient CLI Cybercriminals littleknown love secret Tool utility weapon Windows
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleMonument Valley 3 launches on console and PC on July 22
    Next Article Andorra vs. England: Livestream World Cup 2026 Qualifier Soccer Free From Anywhere
    Techurz
    • Website

    Related Posts

    Opinion

    Littlebird raises $11M for its AI-assisted ā€˜recall’ tool that reads your computer screen

    March 23, 2026
    Opinion

    Why Garry Tan’s Claude Code setup has gotten so much love, and hate

    March 17, 2026
    Opinion

    Former GitHub CEO raises record $60M dev tool seed round at $300M valuation

    February 10, 2026
    Add A Comment
    Latest Tech Pulse

    College social app Fizz expands into grocery delivery

    September 3, 20252,289 Views

    A Former Apple Luminary Sets Out to Create the Ultimate GPU Software

    September 25, 202516 Views

    AI is becoming introspective – and that ‘should be monitored carefully,’ warns Anthropic

    November 3, 202512 Views
    Stay In Touch
    • YouTube
    • WhatsApp
    • Twitter
    • Pinterest
    • LinkedIn

    Techurz helps readers stay ahead of digital change with clear, practical, future-focused technology intelligence - written today, searched tomorrow.

    X (Twitter) Pinterest YouTube LinkedIn WhatsApp
    Company
    • About Us
    • Contact Us
    • Our Authors / Editorial Team
    • Write For Us
    • Advertise
    Policy
    • Editorial Policy
    • Privacy Policy
    • Terms and Conditions
    • Affiliate Disclosure
    • Cookie Policy
    • Disclaimer
    • DMCA
    Explore
    • AI Systems
    • Cyber Reality
    • Future Tech
    • Disruption Lab
    • Signals
    • Tech Pulse
    • Sitemap

    Join the Techurz Brief

    The future does not arrive suddenly.
    Stay ahead with fast, sharp tech signals.

    Type above and press Enter to search. Press Esc to cancel.