Hackers: Ditch the malware, we're in... Just act like a normal network admin. *Whistles*

  Image Source: Article

Image Source: Article

Hackers almost exclusively use standard network admin tools to move around a compromised network once they’ve broken in using malware or other hacking techniques.

Researchers at security startup LightCyber found that 99 per cent of post-intrusion cyberattack activities did not employ malware, but rather employed standard networking, IT administration and other tools.

Read the full article