Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers Repurpose Ranshub’s Edrkillshifter in Medus, Bio and Game Attacks
Global Security

Hackers Repurpose Ranshub’s Edrkillshifter in Medus, Bio and Game Attacks

AdminBy AdminMarch 27, 2025No Comments3 Mins Read
RansomHub's EDRKillShifter
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


March 27, 2025Red LakshmananSecurity of the final points / redemption

Edrkillhifter Ranshubub

A new analysis revealed the connection between affiliates RansomHub and other groups of ransomers like Jellyfish. Biosand Play.

The connection is related to the use of a custom tool designed to disconnect the software to detect and respond to the final points (EDR) on compromised hosts, ESET reports. The Edr Murder Tool called EdrkillhifterIt was first recorded as RansomHub actors in August 2024.

Edrkillshifter performs its goals with the help of a well -known tactic called “Give your own vulnerable driver (BYOVD), which involves the use of a legitimate but vulnerable driver to stop security solutions that protect the final points.

Cybersecurity

The idea of ​​using such tools is to ensure the smooth ransonfire, without the safety decisions.

“During the invasion of the partner’s goal is to receive the privileges of the administrator or the administrator,” – ESET researchers Jakub Suchek and Jan Holman – Note In a report that shared with Hacker News.

“Redemption operators usually do not make the main updates of their encryption too often because of the risk of introduction, which can cause problems by eventually harming their reputation. As a result, security providers detect the encrypts quite well, which affiliates are reacting using the EDR killers to” get rid of security. “

Edrkillhifter Ranshubub

It is noteworthy that the registered tools developed by RansomHub operators and offered by its affiliates – something rare on its own – used in other jelly -related ransom attacks, bio and play.

This aspect is of particular importance in the light of the fact that both the game and the bio work under the closed RAAS model, in which the operators do not seek to hire new branches, and their partnerships are based on long -term mutual trust.

“The trusted members of the Play and Bianalian cooperate with the opponents, even recently appeared such as RansomHub, and then rearrange the tool they receive from these competitors in their attacks,” ESET expressed theoretically. “This is especially interesting, because such closed gangs usually use a fairly consistent set of basic tools during their invasion.”

It is suspected that all these ransomware attacks were conducted by the same threat actor called Quadswitcher, who is probably related to the closest in connection with the trade mode usually related to the intervention of the game.

Also observed is Edrkillshifter used by another individual partner known as Cosmicbeetle As part of three different ransomHub attacks and fake castles.

Cybersecurity

Development occurs against the background of the surge attack on the ransom using Technique byovd Expand EDR killers on compromised systems. Last year was discovered gang ransomware, known as Embargo using a program called Ms4killer To neutralize the safety software. Recently this month crew Medusa Ransomware was associated with a custom malicious driver called Abrasion.

“The actors of the threats need the administrator’s privileges to deploy the EDR killer, so ideally their presence should be discovered and mitigated before they reach this item,” Eset said.

“Users, especially in corporate conditions, must provide discrepancies in potentially dangerous applications. This can prevent the installation of vulnerable drivers.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025

Band

June 13, 2025

Apple Zero Click’s downside in reports to spy on journalists using spyware Paragon software

June 13, 2025

Both Vextrio and affiliates control the global network

June 12, 2025

How to Decide Safety Expanding

June 12, 2025

The new tokenbreak attack combines AI moderation with a one -sided character change

June 12, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Invitation to Disagreement Link from ASYNCRAT and SKULD Theft, focused on cry

June 14, 2025

More than 269 000 sites infected with malicious JSFiretruC JavaScript software in one month

June 13, 2025

Transition from Monitoring Alert to Risk Measurement

June 13, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.