The Department of Health and Human Services Cybersecurity Coordination Center detailed a number legitimate security tools most often abused by threat actors, like Cobalt Strike and PowerShell. Mitigation measures, however, are not as straightforward as patching or applying set security measures.