КућаМалвер и претњеEDRSilencer, a Tool Previously Used by Threat Actors, Repurposed for Malicious Intent

EDRSilencer, a Tool Previously Used by Threat Actors, Repurposed for Malicious Intent

Објављено на

spot_img

In a groundbreaking revelation by the Trend Micro Threat Hunting Team, a disturbing trend has emerged in the realm of cyber attacks. Malevolent actors are now utilizing EDRSilencer, a red team tool originally designed for security professionals, to disrupt endpoint detection and response (EDR) systems. This innovative yet concerning development poses a significant threat to cybersecurity worldwide.

Initially intended as a tool for legitimate security purposes, EDRSilencer has been maliciously repurposed to impede the transmission of telemetry and alerts from EDR systems to their management consoles. By doing so, cybercriminals are able to effectively evade detection and removal by security measures, effectively flying under the radar and wreaking havoc undetected.

The modus operandi of EDRSilencer involves leveraging the Windows Filtering Platform (WFP) to identify active EDR processes on a targeted system, subsequently creating filters to obstruct their outbound communications. This sophisticated approach hampers EDR solutions from effectively identifying and reporting potential threats, rendering them blind to looming dangers.

In addition to disrupting EDR processes, EDRSilencer has demonstrated capabilities beyond its initial target list. During testing, it was observed that the tool could also block other processes, showcasing a versatile and broad-reaching effectiveness in evading detection and prevention mechanisms.

The operational mechanics of EDRSilencer rely on the exploitation of the WFP framework, a legitimate component of Windows that empowers developers to define custom rules for network filtering. By specifically targeting traffic associated with EDR processes, cybercriminals can effectively disable security tools from transmitting vital telemetry data and alerts, granting them free rein to perpetrate malicious activities with impunity.

The command-line interface of EDRSilencer offers attackers a plethora of options for blocking EDR traffic, including automated blocking of detected processes, selective blocking of specific process paths, and the ability to remove filters created by the tool. This flexibility empowers malicious actors to tailor their evasion tactics to suit their specific objectives, further complicating the task of detecting and mitigating their activities.

The attack chain orchestrated by EDRSilencer typically commences with a process discovery phase, where the tool compiles a comprehensive list of running processes associated with EDR products. Subsequently, the attacker deploys EDRSilencer to effectively block outbound communications for these processes, thereby preventing vital telemetry data from reaching management consoles and enabling malicious payloads to operate undetected.

In response to this emergent threat, Trend Micro recommends the implementation of multi-layered security controls, including network segmentation, defense-in-depth strategies, behavioral analysis, application whitelisting, continuous monitoring, threat hunting, and strict access controls to mitigate the risks posed by tools like EDRSilencer. By proactively fortifying defenses and enhancing vigilance, organizations can safeguard their networks and data from the insidious tactics employed by cybercriminals.

Извор линк

Најновији чланци

Netskope Acquires Dasera for Enhanced Cloud Data Security

Netskope, a Silicon Valley-based SASE vendor, recently made headlines with its acquisition of Dasera,...

Reasons to have a Personal VPN

As online threats continue to rise and privacy concerns become more prominent, the use...

CISA Issues ICS Advisories for Preventing Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued two critical Industrial Control Systems...

Cybersecurity chief warns of widening gap between cyber threats and defences

The National Cyber Security Centre (NCSC) has reported a significant increase in cyber incidents...

Више овако

Netskope Acquires Dasera for Enhanced Cloud Data Security

Netskope, a Silicon Valley-based SASE vendor, recently made headlines with its acquisition of Dasera,...

Reasons to have a Personal VPN

As online threats continue to rise and privacy concerns become more prominent, the use...

CISA Issues ICS Advisories for Preventing Cyber Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) recently issued two critical Industrial Control Systems...
sr_RSSerbian