Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers abuse the EDRSilencer tool to bypass security and hide malicious activities
Global Security

Hackers abuse the EDRSilencer tool to bypass security and hide malicious activities

AdminBy AdminOctober 16, 2024No Comments3 Mins Read
Hackers Abuse EDRSilencer Tool
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 16, 2024Ravi LakshmananEndpoint Security / Malware

Hackers abuse the EDRSilencer tool

Threat actors are attempting to abuse the open source EDRSilencer tool in an effort to spoof Endpoint Detection and Response (EDR) solutions and conceal malicious activity.

Trend Micro said it discovered that “threat actors are attempting to integrate EDRSilencer into their attacks by repurposing it as a means of evading detection.”

EDRS silencerinspired NightHawk FireBlock the tool from MDSec is designed to block the outbound traffic of running EDR processes using the Windows Filtering Framework (MPP).

It supports termination of various processes related to EDR products from Microsoft, Elastic, Trellix, Qualys, SentinelOne, Cybereason, Broadcom Carbon Black, Tanium, Palo Alto Networks, Fortinet, Cisco, ESET, HarfangLab and Trend Micro.

Cyber ​​security

By including such legitimate red teaming tools in their arsenal, the goal is to render EDR software ineffective and make it much more difficult to identify and remove malware.

“WFP is a powerful framework built into Windows for building network filters and security applications,” Trend Micro researchers said. “It provides developers with an API to define custom rules to monitor, block or modify network traffic based on various criteria such as IP addresses, ports, protocols and applications.”

“WFP is used in firewalls, antivirus software, and other security solutions to protect systems and networks.”

Hackers abuse the EDRSilencer tool

EDRSilencer takes advantage of WFP by dynamically identifying running EDR processes and creating persistent WFP filters to block their outgoing network connections on both IPv4 and IPv6, thereby preventing security software from sending telemetry to their management consoles.

The attack essentially works by scanning the system to collect a list of running processes related to common EDR products, then running EDRSilencer with the “blockedr” argument (eg EDRSilencer.exe blockedr) to block outbound traffic from those processes by configuring WFP filters .

“This allows malware or other malicious activity to remain undetected, increasing the potential for successful attacks without detection or intervention,” the researchers said. “This underscores the current trend of threat actors looking for more effective tools for their attacks, especially those designed to disable antivirus and EDR solutions.”

Cyber ​​security

The development came as a result of ransomware groups using formidable EDR destruction tools such as AuKill (aka AvNeutralizer), EDRKillShifter, TrueSightKiller, GhostDriver and Terminator is growing, and these programs use vulnerable drivers to elevate privileges and terminate security-related processes.

“EDRKillShifter improves resilience mechanisms by using techniques that ensure its continuous presence on the system, even after the initial intrusions have been detected and remedied.”—Trend Micro said in a recent analysis.

“It dynamically disrupts security processes in real-time and adapts its methods as detection capabilities evolve, staying one step ahead of traditional EDR tools.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025

New Mattery Model for Browser Safety: Closing Risk in Last Mile

July 1, 2025

Google Patches Critical Lack of Zero Day in the V8 Chrome engine after active operation

July 1, 2025

US arrests in North Korean IT -Work scheme; Captures 29 domains and raids 21 laptops

July 1, 2025

Microsoft Removes Password Management from Authenticator app since August 2025

July 1, 2025

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Critical vulnerability in Anthropic MCP exposes machines for remote feats

July 1, 2025

Ta829 and Unk_greensec share tactics and infrastructure in current malware

July 1, 2025

A new drawback in the IDES as a Visual Studio code allows for malicious bypassing bypassing the verified status

July 1, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.