A significant shift in attack methodology, moving away from conventional techniques to leverage legitimate system tools.