Introduction: The Myth That Malware Is Your Biggest Threat
For years, cybersecurity strategies have focused on blocking malware—viruses, ransomware, and Trojans. But a growing body of evidence suggests the real danger isn't the software you haven't seen, but the software you already trust. According to recent analysis by Bitdefender, the most dangerous activity inside most organizations no longer looks like an attack—it looks like administration. PowerShell, WMIC, netsh, Certutil, and MSBuild are just a few examples of trusted utilities that your IT team uses every day. Unfortunately, they are also the preferred toolkit of modern threat actors. This article explores what happens when you spend 45 days monitoring these tools, and what that reveals about your true attack surface.

The Reality: Trusted Tools as Attack Vectors
Modern attackers have become masters of living off the land. Instead of deploying custom malware, they leverage built-in system tools that are already whitelisted and trusted. This approach—often called “living off the land” (LotL)—makes detection extremely difficult. Tools like PowerShell, WMIC, netsh, Certutil, and MSBuild are designed for legitimate administrative tasks, but in the wrong hands they can execute remote commands, move laterally, download payloads, and exfiltrate data—all without triggering traditional antivirus alerts.
Why 45 Days? The Significance of the Observation Period
A 45-day monitoring window is long enough to capture the full lifecycle of an attack. Many advanced persistent threats (APTs) operate slowly, using low-and-slow techniques to avoid detection. Over 45 days, you can observe patterns that a single-day snapshot would miss: gradual escalation of privileges, periodic beaconing, and the subtle misuse of administrative utilities. This period also helps distinguish between legitimate use and malicious activity by providing a baseline of normal behavior.
What Monitoring Uncovers
When you watch your own tools for 45 days, several revealing patterns emerge:
- Anomalous Usage Patterns – Tools being executed at unusual times (e.g., 3 AM), from unexpected user accounts, or with unusual command-line arguments. For example, PowerShell scripts that download files from the internet or enumerate Active Directory users.
- Lateral Movement – WMIC or MSBuild being used to connect to remote machines and execute commands, potentially moving from a compromised workstation to a domain controller.
- Data Exfiltration – Certutil or Bitsadmin used to transfer data to external servers, bypassing standard network security controls.
- Persistence Mechanisms – Scheduled tasks created via schtasks or registry modifications via reg.exe that allow attackers to maintain access.
Anomalous Usage Patterns
One of the first things you'll notice is the surprising frequency with which administrative tools are used outside normal business hours. In a typical organization, IT staff may run PowerShell scripts during maintenance windows, but a sudden spike at 2 AM from a service account should raise immediate red flags. Similarly, using netsh to manipulate firewall rules from a user workstation rather than a server suggests something is amiss.
Unauthorized Administrative Actions
Attackers often escalate privileges through tools like WMIC or MSBuild. Monitoring these utilities can reveal attempts to create new user accounts, modify group memberships, or disable security controls. For instance, a persistent attacker might use Net user and Net localgroup commands to add a backdoor account, then cover their tracks by deleting logs. Over 45 days, such patterns become statistically significant.

Bitdefender's Analysis and Real-World Cases
Bitdefender's research into real-world attacks highlights several incidents where trusted tools were the primary vector. In one case, attackers used Certutil to decode and execute a base64-encoded payload, bypassing email security filters. In another, PowerShell was used to load reflective DLLs, leaving no executable file on disk. The 45-day monitoring approach would have caught both—by flagging the unusual command-line arguments and the subsequent network connections. This reinforces the need to expand your definition of attack surface to include every tool your organization trusts.
How to Mitigate the Risk
Understanding that your own tools are a key part of the attack surface is only half the battle. The following steps can help you reduce the risk:
- Implement Logging and Monitoring – Enable verbose logging for PowerShell, command-line auditing, and Windows Event Logs. Centralize these logs in a SIEM for analysis.
- Adopt Least Privilege – Restrict use of administrative tools to only those who need them. Use just-in-time (JIT) access to limit exposure.
- Use Application Control – Whitelist only approved scripts and binaries. Block execution from temp folders or user-writable paths.
- Establish Baselines - Over the first 30–45 days, establish a baseline of normal tool usage. Then use anomaly detection to spot deviations.
- Conduct Regular Red Team Exercises – Simulate attacks using the same tools to test your detection capabilities.
Conclusion: Expanding the Definition of Attack Surface
After 45 days of watching your own tools, the lesson is clear: your true attack surface includes every piece of software you trust. The line between legitimate administration and malicious activity is thin, and attackers exploit that ambiguity. By monitoring how PowerShell, WMIC, netsh, Certutil, and MSBuild are used, you gain visibility into the techniques that modern adversaries rely on. The most dangerous threat isn't always a new piece of malware—it's the toolbox you already have. Start watching your tools, and you'll begin to see the real landscape of your security.