Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 616

Living off the Land

What is Living off the Land?

Living off the LandAn attacker tradecraft style that abuses legitimate, pre-installed tools and scripts on a victim system instead of dropping custom malware.


Living off the Land (LotL) describes intrusions where adversaries achieve execution, discovery, persistence, and lateral movement using built-in operating-system utilities and trusted administrative software (PowerShell, WMI, certutil, bitsadmin, schtasks, rundll32, ssh, curl, AWS CLI). Because these binaries are signed and expected, they often evade signature-based antivirus and blend into normal admin telemetry, making detection a behavioural problem rather than a file-hash problem. LotL is closely tied to MITRE ATT&CK defense-evasion and execution tactics and is heavily used by APT groups and ransomware affiliates. Defences focus on application control (WDAC/AppLocker), command-line and script-block logging, EDR behavioural analytics, and least privilege.

Examples

  1. 01

    Using certutil.exe to download a second-stage payload from an attacker-controlled URL.

  2. 02

    Running encoded PowerShell with bitsadmin and scheduled tasks instead of installing an EXE.

Frequently asked questions

What is Living off the Land?

An attacker tradecraft style that abuses legitimate, pre-installed tools and scripts on a victim system instead of dropping custom malware. It belongs to the Attacks & Threats category of cybersecurity.

What does Living off the Land mean?

An attacker tradecraft style that abuses legitimate, pre-installed tools and scripts on a victim system instead of dropping custom malware.

How does Living off the Land work?

Living off the Land (LotL) describes intrusions where adversaries achieve execution, discovery, persistence, and lateral movement using built-in operating-system utilities and trusted administrative software (PowerShell, WMI, certutil, bitsadmin, schtasks, rundll32, ssh, curl, AWS CLI). Because these binaries are signed and expected, they often evade signature-based antivirus and blend into normal admin telemetry, making detection a behavioural problem rather than a file-hash problem. LotL is closely tied to MITRE ATT&CK defense-evasion and execution tactics and is heavily used by APT groups and ransomware affiliates. Defences focus on application control (WDAC/AppLocker), command-line and script-block logging, EDR behavioural analytics, and least privilege.

How do you defend against Living off the Land?

Defences for Living off the Land typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Living off the Land?

Common alternative names include: LotL, LOL.

Related terms

See also