Skip to content

Attacker Tool & Framework Catalog

Catalog at a Glance

This page aggregates 75+ attacker tools, frameworks, and malware families identified across all threat actor deep-dives into a unified cross-cutting reference. Key findings:

  • Cobalt Strike remains the single most widely adopted tool, used by every nation-state actor category (China, Russia, DPRK, Iran) and the entire ransomware ecosystem
  • ~60% of tools observed in modern intrusions are commodity, open-source, or living-off-the-land --- custom malware is increasingly reserved for high-value targets and later kill chain phases
  • Top 5 tools by actor adoption: Cobalt Strike, Mimikatz, PowerShell (LOTL), Impacket, PsExec
  • Tool convergence is accelerating: nation-state actors increasingly adopt the same commodity/OSS frameworks used by cybercriminals, complicating attribution

Cross-references: Kill Chain Analysis | Defensive Gap Analysis | Research Opportunities


1. Tool Taxonomy

The attacker tooling ecosystem spans eight functional categories, from initial exploitation through persistence and defense evasion.

mindmap
  root((Attacker<br/>Tool Taxonomy))
    Exploit Frameworks
      Metasploit
      Custom zero-day exploits
      Browser exploit kits
    C2 Frameworks
      Cobalt Strike
      Brute Ratel C4
      Sliver
      Mythic
      Custom implants
    Post-Exploitation
      Mimikatz
      Impacket
      BloodHound
      PowerSploit
    Credential Access
      LaZagne
      HYPERSCRAPE
      Kerberoasting tools
      Browser stealers
    Lateral Movement
      PsExec
      WMI/WMIC
      RDP abuse
      SSH tunneling
    Defense Evasion
      BYOVD tools
      DLL side-loading
      Process injection
      Timestomping
    Reconnaissance
      SharpHound
      Network scanners
      Cloud enumeration
    Loaders & Droppers
      QakBot
      IcedID
      Emotet
      BumbleBee

2. Master Tool Catalog

Exploit Frameworks

Tool Type Known Users First Seen Status
Metasploit Commodity / OSS All actor categories 2003 Active
Custom zero-day exploits (Ivanti, Fortinet, Citrix) Custom China (Volt Typhoon, APT31, APT5), Iran Ongoing Active
MOVEit / GoAnywhere exploits Custom (0-day) Ransomware (Cl0p / FIN11) 2023 Active
ProxyLogon / ProxyShell chains Commodity (1-day) China (Hafnium), Iran, Ransomware 2021 Declining

C2 Frameworks

Tool Type Known Users First Seen Status
Cobalt Strike Commodity (leaked/cracked) China, Russia, DPRK, Iran, Ransomware --- virtually universal 2012 Active
Brute Ratel C4 Commodity Ransomware affiliates (Black Basta, BlackCat), some nation-state 2022 Active
Sliver Open-source Growing adoption across all actor types; Russia (APT29), Ransomware 2020 Rising
Mythic Open-source Red teams transitioning to adversary adoption; early nation-state use 2020 Rising
ShadowPad Shared (PRC ecosystem) China --- APT41, Winnti, RedFoxtrot, Earth Lusca, 15+ PRC groups 2017 Active
X-Agent / XTunnel Custom Russia --- APT28 / GRU Unit 26165 2014 Active
Snake Custom Russia --- Turla / FSB Center 18 2003 Disrupted (2023 FBI takedown)

Post-Exploitation & Credential Access

Tool Type Known Users First Seen Status
Mimikatz Commodity / OSS All actor categories --- universal adoption 2011 Active
Rubeus Open-source Ransomware affiliates, red teams, Kerberoasting/AS-REP roasting 2018 Active
SharpHound / BloodHound Open-source Ransomware, nation-state actors --- AD enumeration 2016 Active
Impacket Commodity / OSS All actor categories --- Python toolkit for SMB, WMI, Kerberos attacks 2012 Active
PowerSploit Commodity / OSS Broad adoption, declining in favor of newer tools 2012 Declining
LaZagne Open-source Iran (MuddyWater, OilRig), Ransomware 2015 Active
HYPERSCRAPE Custom Iran --- APT35 / Charming Kitten email harvesting 2022 Active
Browser credential stealers Custom / Commodity DPRK (Qilin, Chrome targeting), info-stealer malware ecosystem 2020+ Rising

Lateral Movement

Tool Type Known Users First Seen Status
PsExec LOTL (Sysinternals) All actor categories --- universal 1999 Active
WMI / WMIC LOTL All actor categories --- universal Native Active
SMBExec Commodity / OSS Ransomware, Russia 2013 Active
RDP (Remote Desktop Protocol) LOTL All actor categories --- primary lateral movement vector for Ransomware Native Active
SSH tunneling LOTL China (Volt Typhoon), DPRK, Russia Native Active

Defense Evasion

Tool Type Known Users First Seen Status
Terminator (BYOVD) Commodity (sold on forums) Ransomware affiliates, DPRK 2023 Rising
AuKill (BYOVD) Commodity Ransomware (Black Basta, Medusa) 2023 Rising
Backstab (BYOVD) Open-source Ransomware, DPRK 2022 Active
DLL side-loading Technique China --- primary evasion technique across 15+ PRC groups 2010+ Active
Process injection (various) Technique All actor categories Ongoing Active
Timestomping Technique China, Russia Ongoing Active

Loaders & Droppers

Tool Type Known Users First Seen Status
QakBot / QBot Commodity (MaaS) Ransomware ecosystem (Black Basta, REvil) 2007 Disrupted (2023), partially resurfaced
IcedID / BokBot Commodity (MaaS) Ransomware ecosystem (Conti successors) 2017 Declining
Emotet Commodity (MaaS) Ransomware ecosystem (historically Conti/Ryuk) 2014 Disrupted multiple times, intermittent
BumbleBee Commodity (MaaS) Ransomware ecosystem (Conti successors, replaced BazarLoader) 2022 Active
PlugX / Korplug Shared (PRC ecosystem) China --- used by 15+ PRC groups (APT10, APT41, Mustang Panda, etc.) 2008 Active

Custom Malware Families

Malware Origin Category Known Users Notable For
ShadowPad China Modular backdoor APT41, Winnti, RedFoxtrot, Earth Lusca Shared across PRC groups; modular plugin architecture
PlugX / Korplug China RAT 15+ PRC groups Longest-running PRC implant; still actively developed
China Chopper China Web shell APT40, APT41, Hafnium 4KB web shell; trivial to deploy, hard to detect
Winnti China Kernel-level backdoor Winnti Group / APT41 Kernel rootkit with supply chain deployment
NotPetya Russia Wiper (disguised as ransomware) Sandworm / GRU Unit 74455 $10B+ in global damage; most destructive cyberattack to date
Industroyer / CrashOverride Russia ICS malware Sandworm / GRU Unit 74455 Directly manipulates power grid protocols (IEC 61850, IEC 104)
SUNBURST Russia Supply chain backdoor APT29 / SVR (Cozy Bear) SolarWinds compromise; 18,000 organizations received trojanized update
FoggyWeb / MagicWeb Russia AD FS backdoor APT29 / SVR Targets identity infrastructure; steals tokens and certificates
AppleJeus DPRK Crypto-targeting trojan Lazarus Group Trojanized cryptocurrency trading applications
FASTCash DPRK ATM manipulation Lazarus Group / BeagleBoyz Intercepts ISO 8583 transaction messages on payment switches
Shamoon (Disttrack) Iran Wiper APT33 / Elfin Destroyed 35,000 Saudi Aramco workstations (2012)
BiBi Wiper Iran Wiper (Linux/Windows) Void Manticore / MOIS-linked Named after Israeli PM; deployed post-October 2023

3. Shared Tooling Analysis

Attribution Collapse: When Everyone Uses the Same Tools

The dominance of commodity and open-source tooling in modern intrusions has fundamentally undermined tool-based attribution. When a defender finds Cobalt Strike, Mimikatz, and Impacket on a compromised host, the attacker could be any of the following:

  • A PRC espionage team conducting IP theft
  • A GRU unit pre-positioning in critical infrastructure
  • A ransomware affiliate preparing to deploy an encryptor
  • A red team running an authorized assessment

This convergence forces threat intelligence teams to rely on behavioral analysis, infrastructure patterns, victimology, and geopolitical context rather than tool artifacts for attribution --- a significantly higher analytical bar.

The Supply Chain of Attacker Tooling

The attacker tooling ecosystem has its own supply chain dynamics:

  • Leaked tools: Cobalt Strike source code leaked in 2020; cracked versions distributed freely. Brute Ratel C4 was cracked and leaked within months of gaining traction. Each leak permanently expands the attacker toolkit available to lower-skill actors.
  • Open-source proliferation: Tools like Sliver, Mythic, and Havoc are developed openly on GitHub. While created for legitimate red team use, they are immediately available to adversaries with no licensing friction.
  • Forum-sold tooling: BYOVD tools (Terminator, AuKill), custom packers, and EDR bypass kits are sold on Russian-language forums (XSS, Exploit) for $300--$5,000.
  • Malware-as-a-Service loaders: QakBot, IcedID, BumbleBee, and Emotet operated as commercial services providing initial access to paying customers --- primarily ransomware affiliates.

This supply chain means that a disruption at any single tool only temporarily degrades attacker capability. When QakBot was taken down in August 2023, ransomware affiliates shifted to IcedID, BumbleBee, and Pikabot within weeks.

The Cobalt Strike Problem

Cobalt Strike exemplifies the "shared tooling" challenge. Originally a legitimate red team tool, cracked and leaked versions have proliferated since approximately 2020. Fortra (the vendor) and law enforcement have attempted takedowns of pirated Cobalt Strike infrastructure, but the tool remains ubiquitous across the threat landscape.

  • Estimated 70%+ of targeted intrusions in 2024 involved Cobalt Strike at some phase (Google TAG / VirusTotal analysis)
  • Fortra and Microsoft coordinated legal action in 2023 to seize infrastructure hosting cracked copies
  • Despite enforcement efforts, cracked builds remain freely available on underground forums

ShadowPad: China's Shared Malware Service

ShadowPad functions as a shared malware platform across PRC-linked groups --- a "malware-as-a-service" for the Chinese intelligence community. First identified in supply chain attacks in 2017 (NetSarang and CCleaner compromises), it has since been adopted by at least 15 distinct PRC-attributed groups.

  • Modular plugin architecture allows different teams to customize functionality
  • Central development and distribution suggests institutional coordination across MSS and PLA cyber units
  • Represents a maturation of China's offensive cyber program toward shared infrastructure and reduced duplication (Recorded Future, 2023; PwC Threat Intelligence, 2022)

Tool Convergence Trend

Nation-state actors are increasingly adopting commodity and open-source tools that were historically associated with cybercriminals:

Trend Evidence Implication
Nation-state adoption of OSS C2 APT29 using Sliver; PRC groups using Cobalt Strike Blurred line between state and criminal TTPs
BYOVD going mainstream DPRK, ransomware groups, and some PRC actors all using Terminator/AuKill EDR bypass is commoditized
Shared loader ecosystem Ransomware groups rotate through QakBot, IcedID, BumbleBee as each is disrupted Loader supply chain is resilient and modular

4. LOTL Binary Catalog

Living-off-the-land (LOTL) techniques use legitimate system binaries and administrative tools for malicious purposes, blending attacker activity with normal operations.

Binary Legitimate Purpose Attacker Use Known Abusers Detection Approach
PowerShell Scripting, automation Download cradles, fileless execution, reconnaissance All actors --- universal Script block logging, AMSI, constrained language mode
cmd.exe Command interpreter Batch execution, chained commands All actors Command-line logging, parent-child process analysis
certutil Certificate management File download, Base64 encode/decode China (Volt Typhoon), Ransomware Flag -urlcache and -decode usage
mshta HTML Application host Execute HTA payloads, bypass application controls Iran (MuddyWater), Ransomware Monitor mshta.exe spawning child processes
rundll32 DLL execution Load malicious DLLs, proxy execution China, Russia, Ransomware Unusual DLL paths, command-line arguments
regsvr32 COM registration Proxy execution, AppLocker bypass Iran, Ransomware Scrobj.dll usage, network connections from regsvr32
wmic WMI client Remote execution, reconnaissance, lateral movement All actors --- universal Process creation via WMI, unusual WMIC queries
bitsadmin Background transfer File download, persistence China, DPRK Non-standard transfer jobs, unusual source URLs
net.exe / net1.exe Network configuration Account enumeration, group discovery All actors Bulk net user/net group commands in sequence
nltest Domain controller query Domain trust enumeration Ransomware, Russia nltest /dclist, /domain_trusts usage

The Fundamental LOTL Detection Challenge

LOTL techniques represent one of the hardest unsolved problems in defensive security. Every binary listed above has legitimate daily use by system administrators, automation scripts, and enterprise management tools. The attacker's commands are syntactically identical to benign ones.

Traditional signature-based and even basic behavioral detection fails because:

  • The binary is signed by Microsoft and inherently trusted
  • Application allowlists explicitly permit these tools
  • Volume of legitimate use creates overwhelming noise
  • Context (who, when, why) is the only discriminant --- and most security tools lack it

This is the core reason China's Volt Typhoon campaign went undetected for years in U.S. critical infrastructure: they used almost exclusively LOTL techniques, generating no malware artifacts for EDR to flag (CISA Advisory AA24-038A).

Behavioral Detection Opportunities

The LOTL detection gap creates significant market opportunity for vendors who can move beyond binary-level detection to contextual behavioral analysis:

  • Process lineage / causal chain analysis: Tracking parent-child-grandchild process relationships to identify anomalous execution chains (e.g., Outlook spawning PowerShell spawning certutil)
  • User behavior analytics (UBA): Baseline per-user command patterns; flag deviations (a developer account suddenly running nltest and net group commands)
  • Temporal clustering: Detect sequences of LOTL commands that individually appear benign but collectively map to attack patterns (e.g., whoami, net user, nltest, wmic within a 5-minute window)
  • Cross-host correlation: A single LOTL command on one host is invisible; the same command running across 50 hosts in sequence is lateral movement

See Research Opportunities for deeper analysis.


Custom Malware in Decline for Initial Access

Nation-state actors increasingly use commodity tools for initial access and early kill chain phases, reserving custom malware for later-stage persistence and high-value targets. This is a deliberate tradecraft shift --- commodity tools provide plausible deniability and reduce the risk of burning expensive custom capabilities.

  • China post-2020: Volt Typhoon operates almost entirely with LOTL and commodity tools; custom implants are reserved for high-priority persistent access (Microsoft Threat Intelligence, 2023)
  • Exception: supply chain attacks still require custom implants (SUNBURST, 3CX compromise)

Commodity/OSS C2 Framework Adoption Rising

Framework Trend (2023--2025) Driver
Sliver Rapid growth Free, open-source, harder to signature than Cobalt Strike
Mythic Growing Modular agent design, multiple language support
Brute Ratel C4 Moderate growth Designed to evade EDR; gaining ransomware adoption
Cobalt Strike Stable but targeted Still dominant despite takedown efforts
Havoc Emerging New OSS framework with evasion focus

LOTL Usage Intensifying

Chinese threat actors in particular have dramatically increased LOTL usage since approximately 2020, coinciding with the Volt Typhoon campaign's focus on U.S. critical infrastructure pre-positioning. This shift represents a strategic adaptation to improved Western detection of Chinese custom malware.

  • Pre-2020: PRC groups relied heavily on custom backdoors (PlugX, ShadowPad, China Chopper)
  • Post-2020: Volt Typhoon and related clusters use almost exclusively built-in Windows tools
  • Other actors are following: DPRK and Iran groups also increasing LOTL adoption

BYOVD Emerging as Standard EDR Bypass

Bring Your Own Vulnerable Driver (BYOVD) attacks --- where attackers load legitimately signed but vulnerable kernel drivers to disable security tools --- have moved from niche technique to standard ransomware playbook in 2023--2025.

  • Terminator tool (using a vulnerable Zemana driver) sold openly on cybercrime forums for $3,000
  • AuKill leverages vulnerable Process Explorer drivers to kill EDR processes
  • LOLDrivers project (loldrivers.io) catalogs 700+ vulnerable drivers
  • Microsoft's Vulnerable Driver Blocklist is the primary mitigation but adoption is inconsistent

BYOVD Commoditization

BYOVD has reached the point where no specialized skill is required --- turnkey tools are available for purchase on forums. This effectively commoditizes kernel-level EDR bypass, undermining the detection layer that most enterprises rely on as their primary defense. Every EDR vendor must now defend against the operating system's own driver trust model.

Cloud-Native Tooling in Attacks

As enterprises migrate to cloud, attackers are following with cloud-native techniques:

  • Azure CLI, AWS CLI, gcloud: Used for cloud reconnaissance, privilege escalation, and data exfiltration
  • Azure AD / Entra ID abuse: Token theft, OAuth app abuse, consent phishing
  • Cloud-specific tools: ROADtools (Azure AD enumeration), Pacu (AWS exploitation framework), ScoutSuite
  • Russia (APT29) and DPRK are the most active cloud-targeting nation-state actors

Knowledge Gap

Cloud-native attacker tooling is evolving rapidly and our catalog likely underrepresents the current state. Tool adoption in cloud environments is less visible to traditional threat intelligence collection methods, which are weighted toward endpoint and network telemetry.

Cross-Platform Malware Rising

Malware written in Rust and Go is increasing across all actor categories, enabling single-codebase targeting of Windows, Linux, and macOS:

  • Royal/BlackSuit ransomware: Rust-based encryptor targeting both Windows and Linux/ESXi
  • BlackCat/ALPHV: First major ransomware written in Rust (2021)
  • Sliver, Mythic agents: Go-based, inherently cross-platform
  • DPRK loaders: Multiple DPRK campaigns now use Go-based initial access tools

Defensive Product Implications of Tool Trends

Each trend above creates specific product and investment opportunities:

Trend Defensive Product Need Market Segment
LOTL dominance Behavioral analytics, process lineage tracking SIEM & SOAR, Endpoint
BYOVD commoditization Kernel-level integrity monitoring, driver allowlisting Endpoint
OSS C2 proliferation Network traffic analysis tuned to Sliver/Mythic/Havoc protocols Network Security, NDR
Cloud-native attacks CSPM/CIEM with attack path modeling Cloud Security, Identity
Cross-platform malware Unified detection across Windows, Linux, macOS, containers Endpoint, Cloud Security
Loader ecosystem resilience Email/web gateway detection of novel loader variants Email Security

Tool Disruption Effectiveness

Law enforcement and vendor actions have had mixed results against the attacker tooling supply chain:

Action Target Year Outcome
FBI Operation Duck Hunt QakBot infrastructure 2023 Temporarily effective; partial resurfacing within months
Europol Operation Endgame IcedID, SystemBC, Pikabot, SmokeLoader, BumbleBee 2024 Significant disruption; ecosystem adapted to alternatives
Fortra / Microsoft legal action Cracked Cobalt Strike 2023 Reduced some infrastructure; cracked copies still widely available
FBI Operation MEDUSA Turla's Snake malware 2023 Successful disruption of 20-year-old implant network
ODNI/Five Eyes attribution Volt Typhoon LOTL TTPs 2024 Awareness raised; detection remains fundamentally difficult

The pattern is clear: disruption works best against centralized infrastructure (C2 servers, loader botnets) and works poorly against distributed knowledge (LOTL techniques, open-source tools, leaked source code). This asymmetry favors continued attacker adoption of decentralized, commodity tooling.


6. Sources

  1. MITRE ATT&CK --- Software and Tools: https://attack.mitre.org/software/
  2. Google TAG Cobalt Strike abuse analysis: https://blog.google/threat-analysis-group/google-tag-efforts-to-counter-cobalt-strike-abuse/
  3. CISA Advisory AA24-038A --- PRC State-Sponsored Actors (Volt Typhoon): https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-038a
  4. Microsoft Threat Intelligence --- Volt Typhoon LOTL analysis (2023): https://www.microsoft.com/en-us/security/blog/2023/05/24/volt-typhoon-targets-us-critical-infrastructure-with-living-off-the-land-techniques/
  5. Recorded Future --- ShadowPad malware analysis: https://www.recordedfuture.com/research/shadowpad-malware-analysis
  6. PwC Threat Intelligence --- ShadowPad technical report (2022): https://www.pwc.com/gx/en/issues/cybersecurity/cyber-threat-intelligence/shadow-pad.html
  7. LOLDrivers Project --- Vulnerable driver catalog: https://www.loldrivers.io/
  8. CrowdStrike Global Threat Report 2024: https://www.crowdstrike.com/global-threat-report/
  9. Mandiant APT Groups reference: https://www.mandiant.com/resources/insights/apt-groups
  10. Chainalysis --- Crypto hacking and stolen funds 2025: https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2025/
  11. LOLBAS Project --- Living Off The Land Binaries, Scripts and Libraries: https://lolbas-project.github.io/
  12. Fortra / Microsoft coordinated legal action against Cobalt Strike abuse (2023): https://www.fortra.com/newsroom/fortra-takes-legal-action-against-illegal-cobalt-strike-use

Glossary

This glossary defines the acronyms and key terms used throughout the cybersecurity market research site. Use it as a quick reference when navigating segment analyses, pain-point discussions, and opportunity assessments.

A

Term Definition
ACL Access Control List: rules determining which users/systems can access resources
APT Advanced Persistent Threat: a prolonged, targeted cyberattack where an intruder gains and maintains unauthorized access
ASM Attack Surface Management: continuous discovery, inventory, and risk assessment of an organization's external-facing assets
ASPM Application Security Posture Management: unified visibility and risk management across the application lifecycle
AV Antivirus: software designed to detect, prevent, and remove malware

B

Term Definition
BAS Breach and Attack Simulation: automated tools that simulate real-world attacks to test security controls
BEC Business Email Compromise: a social-engineering attack targeting employees with access to company finances or data
BYOVD Bring Your Own Vulnerable Driver: attack technique where adversaries load a legitimately signed but vulnerable kernel driver to disable security tools

C

Term Definition
C2 Command and Control: infrastructure used by attackers to communicate with compromised systems
CASB Cloud Access Security Broker: a security policy enforcement point between cloud consumers and providers
CCPA California Consumer Privacy Act: California state law granting consumers rights over their personal data
CIAM Customer Identity and Access Management: managing and securing external customer identities and authentication
CIEM Cloud Infrastructure Entitlement Management: managing identities and privileges in cloud environments
CTEM Continuous Threat Exposure Management: a program for continuously assessing and prioritizing threat exposures
CNAPP Cloud-Native Application Protection Platform: integrated security for cloud-native applications across the full lifecycle
CSPM Cloud Security Posture Management: continuous monitoring of cloud infrastructure for misconfigurations and compliance risks
CWPP Cloud Workload Protection Platform: security for workloads running in cloud environments (VMs, containers, serverless)
CVE Common Vulnerabilities and Exposures: a standardized identifier for publicly known cybersecurity vulnerabilities

D

Term Definition
DAST Dynamic Application Security Testing: testing a running application for vulnerabilities by simulating attacks
DCS Distributed Control System: a control system for managing industrial processes across multiple locations
DLP Data Loss Prevention: tools and processes to prevent unauthorized data exfiltration or leakage
DORA Digital Operational Resilience Act: EU regulation on ICT risk management for financial entities
DSPM Data Security Posture Management: discovering, classifying, and protecting sensitive data across cloud environments

E

Term Definition
EASM External Attack Surface Management: discovering and monitoring internet-facing assets for exposures
EDR Endpoint Detection and Response: tools that monitor endpoints for threats and provide investigation and response capabilities
EPP Endpoint Protection Platform: integrated endpoint security combining prevention, detection, and response

F/G

Term Definition
FAIR Factor Analysis of Information Risk: a quantitative model for understanding, analyzing, and measuring information risk
GRC Governance, Risk, and Compliance: integrated framework for aligning IT with business goals, managing risk, and meeting regulations
GDPR General Data Protection Regulation: EU regulation on data protection and privacy for individuals

H

Term Definition
HIPAA Health Insurance Portability and Accountability Act: US law governing the privacy and security of health information

I

Term Definition
IAB Initial Access Broker: specialized cybercriminals who compromise networks and sell access to ransomware operators and other buyers
IAM Identity and Access Management: framework for managing digital identities and controlling access to resources
ICS Industrial Control System: control systems used in industrial production and critical infrastructure
IDS Intrusion Detection System: a system that monitors network traffic for suspicious activity and alerts
ITDR Identity Threat Detection and Response: detecting and responding to identity-based attacks and compromises
IoT Internet of Things: network of physical devices embedded with sensors, software, and connectivity
IPS Intrusion Prevention System: a system that monitors and actively blocks detected threats in network traffic

L

Term Definition
LOLBin Living Off the Land Binary: a legitimate system binary that can be abused by attackers for malicious purposes such as downloading payloads, executing code, or bypassing security controls
LOTL Living Off the Land: attack technique using legitimate, pre-installed system tools and binaries rather than custom malware to evade detection

M

Term Definition
MaaS Malware-as-a-Service: cybercrime business model where malware developers sell or rent their tools to other criminals
MDR Managed Detection and Response: outsourced security service providing 24/7 threat monitoring, detection, and response
MITRE ATT&CK MITRE Adversarial Tactics, Techniques, and Common Knowledge: a knowledge base of adversary behaviors and techniques
MSSP Managed Security Service Provider: a third-party provider offering outsourced monitoring and management of security devices
MFA Multi-Factor Authentication: requiring two or more verification factors to gain access to a resource

N

Term Definition
NDR Network Detection and Response: detecting and responding to threats by analyzing network traffic patterns
NERC CIP North American Electric Reliability Corporation Critical Infrastructure Protection: security standards for the electric grid
NGAV Next-Generation Antivirus: advanced antivirus using behavioral analysis, AI, and machine learning beyond signature-based detection
NIS2 Network and Information Systems Directive 2: updated EU directive on cybersecurity for essential and important entities
NIST CSF National Institute of Standards and Technology Cybersecurity Framework: a voluntary framework for managing cybersecurity risk

O

Term Definition
ORB Operational Relay Box: compromised network devices (typically SOHO routers or IoT devices) used by threat actors as proxy infrastructure for command and control traffic
OT Operational Technology: hardware and software that monitors and controls physical devices and processes
OWASP Open Worldwide Application Security Project: a nonprofit focused on improving software security through open-source projects and guidance

P

Term Definition
PAM Privileged Access Management: securing, managing, and monitoring privileged accounts and access
PCI DSS Payment Card Industry Data Security Standard: security standards for organizations that handle credit card data
PII Personally Identifiable Information: any data that could identify a specific individual
PLC Programmable Logic Controller: an industrial computer used to control manufacturing processes

R

Term Definition
RaaS Ransomware-as-a-Service: cybercrime business model where ransomware operators provide malware and infrastructure to affiliates who conduct attacks, splitting profits
RGB Reconnaissance General Bureau: North Korea's primary intelligence agency responsible for clandestine operations including cyber operations

S

Term Definition
SASE Secure Access Service Edge: converged network and security-as-a-service architecture delivered from the cloud
SAST Static Application Security Testing: analyzing source code for vulnerabilities without executing the application
SBOM Software Bill of Materials: a formal inventory of components, libraries, and dependencies in a software product
SCA Software Composition Analysis: identifying open-source components and known vulnerabilities in a codebase
SCADA Supervisory Control and Data Acquisition: a system for monitoring and controlling industrial processes remotely
SD-WAN Software-Defined Wide Area Network: a virtual WAN architecture that simplifies branch networking and optimizes traffic
SEG Secure Email Gateway: a solution that filters inbound and outbound email to block threats and enforce policies
SIEM Security Information and Event Management: aggregating and analyzing log data for threat detection and compliance
SOAR Security Orchestration, Automation, and Response: tools that automate and coordinate security operations workflows
SOC Security Operations Center: a centralized team and facility for monitoring, detecting, and responding to security incidents
SOX Sarbanes-Oxley Act: US law mandating financial reporting and internal control requirements for public companies
SSE Security Service Edge: the security component of SASE, delivering SWG, CASB, and ZTNA as cloud services
SWG Secure Web Gateway: a solution that filters web traffic to enforce security policies and block threats

T

Term Definition
TAM Total Addressable Market: the total revenue opportunity available for a product or service
TCO Total Cost of Ownership: the complete cost of acquiring, deploying, and operating a solution over its lifetime
TIP Threat Intelligence Platform: a system for aggregating, correlating, and operationalizing threat intelligence data
TLS Transport Layer Security: a cryptographic protocol that provides secure communication over a network
TTP Tactics, Techniques, and Procedures: the patterns of behavior and methods used by threat actors to conduct cyber operations

V

Term Definition
VM Vulnerability Management: the ongoing process of identifying, evaluating, treating, and reporting security vulnerabilities

X

Term Definition
XDR Extended Detection and Response: unified threat detection and response across endpoints, network, cloud, and email

Z

Term Definition
ZTNA Zero Trust Network Access: a security model that grants access based on identity verification and least-privilege principles