Bring Your Own Signed Binary

BYOSB in 2025: When Trusted Binaries Go Rogue

A Red Team View on MITRE T1218 Tactics

Intro
In today’s evolving threat landscape, attackers are no longer relying solely on custom malware. Instead, they’re using what’s already trusted — legitimate, signed binaries — to quietly run malicious code under the radar.

This technique is known as BYOSB (Bring Your Own Signed Binary) and falls under the MITRE ATT&CK technique T1218: Signed Binary Proxy Execution. It’s becoming an increasingly common method to bypass modern EDR and AV solutions.


What is BYOSB?

At its core, BYOSB leverages signed executables (like java.exe, python.exe, node.exe, etc.) to run payloads without raising suspicion. These are binaries that are:

  • Signed by a known and trusted vendor

  • Often whitelisted by endpoint protection tools

  • Readily available in many enterprise environments

Unlike traditional LOLBins (Living Off the Land Binaries), these executables are not native to the OS and often come bundled with development or data science toolkits.


Why It Matters Now

In 2025, the trend is clear:
✔️ Endpoint agents are improving — but not fast enough
✔️ Attackers are shifting to low-noise, fileless, signed methods
✔️ Dev and data science environments are becoming prime targets

“You don’t need to break the door down if it’s already wide open.” — Red Team Lead


MITRE T1218: Quick Primer

T1218 is about executing malicious code via signed binaries. These binaries may not be malicious themselves — but when abused, they act as perfect launchpads for payloads.

Why attackers love them:

  • They don’t need to compile custom malware

  • They inherit trust from the vendor signature

  • Their behavior often blends into the noise of daily developer or IT ops activity


The BYOSB Advantage

Compared to PowerShell or cmd.exe (which are heavily monitored), BYOSB tools offer:

  • Cross-platform compatibility

  • Minimal footprint (especially when using standalone binaries like node.exe)

  • Easier EDR evasion due to fewer behavioral signatures


Want to see real-world red team examples and binary comparisons?
Our team analyzed how attackers use BYOSB techniques with binaries like python.exe, node.exe, and java.exe — including how we bypassed EDR using only official packages.

Download the full technical article below. 
(Includes binary SHA256 hashes, VT scores, runtime behavior comparisons, and detection strategies.)

Share this blog

Related Posts