Executive Summary
In mid-2026, threat actors achieved a critical bypass of Microsoft 365 Defender, Microsoft’s AI-driven endpoint detection and response (EDR) solution, by weaponizing Living-off-the-Land Binaries (LOLBins). These attacks exploited undocumented behaviors in native Windows utilities, enabling adversaries to move laterally, escalate privileges, and exfiltrate data without triggering EDR alerts. The attack chain combined adversary-in-the-middle (AitM) phishing for initial access with LOLBin abuse for post-exploitation persistence and defense evasion. This research reveals how attackers evaded AI monitoring by leveraging trusted system processes—highlighting a critical gap in AI-centric security architectures.
Key Findings
certutil, bitsadmin, and mshta.Microsoft 365 Defender integrates AI and machine learning to detect anomalies in endpoint behavior, leveraging behavioral models trained on millions of telemetry events. By 2026, its EDR capability had evolved to detect macro-level behavioral patterns, such as unusual process trees or privilege escalation sequences. However, adversaries adapted by exploiting trusted binaries—native Windows utilities with legitimate purposes but malicious potential when chained improperly. These are collectively known as Living-off-the-Land (LOLBins).
LOLBins are not inherently malicious; they are part of the operating system. But when abused—e.g., using certutil to download payloads or mshta to execute remote scripts—they create attack paths invisible to signature-based tools. The convergence of AitM phishing for credential and session token theft with LOLBin-based post-exploitation created a silent kill chain.
As documented in February 2026, adversaries began using adversary-in-the-middle (AitM) phishing kits (e.g., Evilginx 3.0) to intercept Microsoft 365 authentication flows. Victims would successfully complete MFA, but the attacker’s proxy would silently capture session cookies and access tokens.
Unlike traditional phishing, this method did not require credential theft—it stole authenticated sessions, granting immediate access to Microsoft 365 applications via Single Sign-On (SSO). Once inside, attackers established persistence using otherwise benign tools.
With authenticated access, attackers pivoted to LOLBin abuse. Key exploited utilities included:
certutil: Used to decode and execute base64-encoded payloads downloaded via HTTP, with traffic tunneled over DNS or HTTPS to avoid firewall inspection.bitsadmin: Exploited Background Intelligent Transfer Service to download second-stage malware as part of legitimate OS operations.mshta: Executed malicious HTML applications (HTAs) via mshta.exe, bypassing application control policies that only targeted executables.forfiles: Leveraged to trigger arbitrary command execution by abusing file selection logic.These tools generated minimal telemetry anomalies. AI models trained on known malicious process names or unusual parent-child relationships failed to flag chains like powershell.exe → certutil.exe → encoded_payload.exe, especially when executed during normal user activity windows.
Mid-2026 research revealed that certain LOLBin behaviors were not previously modeled in EDR systems. For instance, certutil -decode followed by execution of the decoded output via cmd /c was not flagged as suspicious, despite being a known attack vector in penetration testing frameworks like Cobalt Strike.
Similarly, bitsadmin /transfer could be chained with msiexec /i to silently install malicious MSI packages—behavior that bypassed AI anomaly detection due to its similarity to legitimate software updates.
AI EDR systems excel at detecting known malicious patterns but struggle with novel valid uses of legitimate tools. Since LOLBin chains are often indistinguishable from normal system operations, anomaly scores remained within acceptable thresholds. The AI models lacked contextual awareness of process lineage or intent.
Most AI-driven EDR tools analyze syntactic features (e.g., command-line arguments, parent processes) but do not perform deep semantic analysis—e.g., determining whether a certutil download aligns with a user’s legitimate software update behavior. Without UEBA integration, contextual anomalies went undetected.
Once an attacker gained authenticated session access via AitM, their activity was attributed to the legitimate user. AI systems prioritized scale and user experience over forensic rigor, often skipping step-up authentication for “trusted” sessions.
1. Implement Process Lineage and Behavioral Context
cmd → certutil → malicious.exe).mshta by a finance user should trigger alerts.2. Enforce Application Control Policies
mshta, certutil) unless explicitly whitelisted.3. Monitor and Restrict Network Egress
certutil).4. Enhance Authentication Hygiene
5. Continuous Threat Modeling and AI Retraining