TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security

BHIS · 2025-08-27 · Read original ↗

ATT&CK techniques detected

9 predictions
T1059.001PowerShell
100%
"- managed ) utilities on a microsoft windows based system. first up is powershell, a built - in command - line shell and scripting language that is used primarily by system admins to perform tasks like automation or configuration management. because it provides such deep access t…"
T1218.010Regsvr32
99%
"can be used to run scripts from remote sources. - regsvr32. exe – used to register dlls and execute code from specially crafted scripts or remote com objects. - cscript. exe and wscript. exe – windows script host executables for running vbscript and jscript files. - installutil. …"
T1021.001Remote Desktop Protocol
98%
"an admin to query and modify system settings, manage services, and gather information about various system components. it also enables remote management capabilities, making it a frequent target for lateral movement by attackers. because of its stealth, power, and versatility, wm…"
T1059.001PowerShell
95%
"to execute their attacks. this is especially true on windows - based systems. as a defender, it ’ s crucial that you understand how these utilities can be used against you and the risks associated with improper management of them. what are administrative utilities? simply put, ad…"
T1218.010Regsvr32
94%
"used to execute malicious payloads or install backdoors without writing conventional malware to disk. to add insult to injury, these utilities are signed by microsoft and are often used in development and deployment workflows, which means they ’ re rarely blocked and are routinel…"
T1021.001Remote Desktop Protocol
90%
"to enumerate users, local and domain groups, organizational units, network shares, and domain trust relationships without triggering alerts. since this activity often mimics normal administrative behavior, it typically goes unnoticed, especially in environments that lack proper l…"
T1204.002Malicious File
66%
"commonly abused administrative utilities : a hidden risk to enterprise security commonly abused administrative utilities : a hidden risk to enterprise security dale spent over 20 years working as an enterprise defender before joining black hills information security as a penetrat…"
T1078Valid Accounts
45%
"to enumerate users, local and domain groups, organizational units, network shares, and domain trust relationships without triggering alerts. since this activity often mimics normal administrative behavior, it typically goes unnoticed, especially in environments that lack proper l…"
T1219Remote Access Tools
34%
"to enumerate users, local and domain groups, organizational units, network shares, and domain trust relationships without triggering alerts. since this activity often mimics normal administrative behavior, it typically goes unnoticed, especially in environments that lack proper l…"

Summary

Organizations tend to focus a significant amount of their efforts on external threats, such as phishing and ransomware, but they often overlook one of the most dangerous attack vectors on their internal networks. 

The post Commonly Abused Administrative Utilities: A Hidden Risk to Enterprise Security  appeared first on Black Hills Information Security, Inc..