1080*80 ad

EDR Killer Exploited by Multiple Ransomware Groups

Ransomware’s New Weapon: How ‘EDR Killers’ Are Disabling Your Security

In the ongoing battle of cybersecurity, organizations have come to rely on Endpoint Detection and Response (EDR) solutions as a critical line of defense. These powerful tools are designed to detect, investigate, and respond to threats on endpoints like laptops and servers. But what happens when the watchdog itself is targeted? A dangerous new trend has emerged where threat actors, particularly ransomware groups, are deploying sophisticated tools designed to do just that: neutralize your security software before they strike.

This new class of malware, often dubbed an “EDR Killer,” is a game-changer in the world of cyberattacks. By disabling the very systems meant to protect a network, attackers can operate freely, deploying ransomware and exfiltrating data with a much higher chance of success.

Understanding the Threat: The Rise of the ‘EDR Killer’

An EDR Killer is a malicious tool or script whose sole purpose is to terminate the processes and services associated with EDR, antivirus (AV), and other security monitoring agents. Think of it as a digital tranquilizer dart for your security systems. Before launching their main payload, attackers first use this tool to put your defenses to sleep.

The primary goal of an EDR Killer is to create a security blind spot, allowing malware like ransomware to execute undetected. Once the EDR agent is offline, it can no longer log suspicious activity, send alerts to security teams, or automatically block malicious files. The attackers effectively blindfold your security operations, giving them the time and access they need to encrypt your critical files and disrupt your business.

How It Works: The ‘Bring Your Own Vulnerable Driver’ (BYOVD) Tactic

You might wonder how these tools can bypass the robust protections built into modern EDR solutions. The answer lies in a clever and highly effective technique known as Bring Your Own Vulnerable Driver (BYOVD).

Security software is designed to be difficult to tamper with, often running with high system privileges. To overcome this, attackers have found a workaround. Instead of trying to fight the security software on its own terms, they exploit the system’s core architecture.

Here’s the typical attack chain:

  1. Initial Access: The attacker gains a foothold in the network through a common method like a phishing email or exploiting an unpatched vulnerability.
  2. Deploy the Vulnerable Driver: The attacker introduces a legitimate, digitally signed, but known-vulnerable hardware driver onto the compromised system. A specific driver recently seen in these attacks is sysent.sys, a component of a legitimate, albeit outdated, security testing tool.
  3. Exploit the Driver: They then exploit the known vulnerability within this driver to escalate their privileges to the highest level possible on the machine—the kernel level.
  4. Terminate Security Processes: With kernel-level access, the attacker has god-mode privileges on the system. They can now forcibly terminate virtually any process, including the hardened services of an EDR or antivirus agent.

By exploiting legitimate but vulnerable drivers, attackers gain kernel-level privileges, a powerful position that allows them to bypass standard security protections and terminate EDR agents. This method is particularly insidious because it uses a legitimate, signed driver to perform the malicious action, making it harder for other security layers to detect.

Who Is Behind These Attacks?

This is not the work of a single, isolated group. The use of EDR-disabling tools has been observed across multiple, highly active ransomware gangs. This indicates that the tool or the technique behind it is likely being sold or shared on dark web forums as part of a “ransomware-as-a-service” ecosystem.

The adoption of this EDR-disabling tool by prominent ransomware groups like Akira and LockBit indicates a dangerous trend toward more standardized and effective attack chains. The widespread availability of such a potent weapon means that organizations of all sizes must be prepared for attacks that specifically target their security infrastructure.

Protecting Your Organization: Actionable Security Measures

Defending against an attack that targets your defenses requires a layered and proactive security posture. Relying on a single tool, even a powerful EDR, is no longer enough.

  • Implement Application Control: Use strict application control policies to prevent unauthorized executables and drivers from running. Whitelisting approved applications and drivers can block attackers from introducing a vulnerable one.
  • Monitor for Suspicious Driver Loading: Your security team should actively monitor for the loading of unusual or known-vulnerable drivers. The appearance of a rare or outdated driver on multiple systems should be an immediate red flag requiring investigation.
  • Harden Your Endpoints: Ensure that user accounts have the least privilege necessary to perform their roles. Attackers often need administrative rights to load a driver in the first place, so limiting this ability can stop an attack before it starts.
  • Enhance Threat Hunting: Shift from a purely reactive to a proactive security model. Empower your security team to hunt for threats, looking for signs of EDR tampering, unusual process terminations, or suspicious PowerShell commands.
  • Maintain a Defense-in-Depth Strategy: EDR is just one layer. Your security strategy must also include network segmentation, regular and timely patching of all systems and software, multi-factor authentication (MFA), and ongoing user security awareness training.

The evolution of attacker tactics to include EDR Killers is a stark reminder that in cybersecurity, there is no silver bullet. Staying ahead of these threats requires constant vigilance, proactive defense, and the understanding that even our strongest shields can be targeted.

Source: https://www.bleepingcomputer.com/news/security/new-edr-killer-tool-used-by-eight-different-ransomware-groups/

900*80 ad

      1080*80 ad