КућаМалвер и претњеEDRSilencer, a Tool Previously Used by Threat Actors, Repurposed for Malicious Intent

EDRSilencer, a Tool Previously Used by Threat Actors, Repurposed for Malicious Intent

Објављено на

spot_img

In a groundbreaking revelation by the Trend Micro Threat Hunting Team, a disturbing trend has emerged in the realm of cyber attacks. Malevolent actors are now utilizing EDRSilencer, a red team tool originally designed for security professionals, to disrupt endpoint detection and response (EDR) systems. This innovative yet concerning development poses a significant threat to cybersecurity worldwide.

Initially intended as a tool for legitimate security purposes, EDRSilencer has been maliciously repurposed to impede the transmission of telemetry and alerts from EDR systems to their management consoles. By doing so, cybercriminals are able to effectively evade detection and removal by security measures, effectively flying under the radar and wreaking havoc undetected.

The modus operandi of EDRSilencer involves leveraging the Windows Filtering Platform (WFP) to identify active EDR processes on a targeted system, subsequently creating filters to obstruct their outbound communications. This sophisticated approach hampers EDR solutions from effectively identifying and reporting potential threats, rendering them blind to looming dangers.

In addition to disrupting EDR processes, EDRSilencer has demonstrated capabilities beyond its initial target list. During testing, it was observed that the tool could also block other processes, showcasing a versatile and broad-reaching effectiveness in evading detection and prevention mechanisms.

The operational mechanics of EDRSilencer rely on the exploitation of the WFP framework, a legitimate component of Windows that empowers developers to define custom rules for network filtering. By specifically targeting traffic associated with EDR processes, cybercriminals can effectively disable security tools from transmitting vital telemetry data and alerts, granting them free rein to perpetrate malicious activities with impunity.

The command-line interface of EDRSilencer offers attackers a plethora of options for blocking EDR traffic, including automated blocking of detected processes, selective blocking of specific process paths, and the ability to remove filters created by the tool. This flexibility empowers malicious actors to tailor their evasion tactics to suit their specific objectives, further complicating the task of detecting and mitigating their activities.

The attack chain orchestrated by EDRSilencer typically commences with a process discovery phase, where the tool compiles a comprehensive list of running processes associated with EDR products. Subsequently, the attacker deploys EDRSilencer to effectively block outbound communications for these processes, thereby preventing vital telemetry data from reaching management consoles and enabling malicious payloads to operate undetected.

In response to this emergent threat, Trend Micro recommends the implementation of multi-layered security controls, including network segmentation, defense-in-depth strategies, behavioral analysis, application whitelisting, continuous monitoring, threat hunting, and strict access controls to mitigate the risks posed by tools like EDRSilencer. By proactively fortifying defenses and enhancing vigilance, organizations can safeguard their networks and data from the insidious tactics employed by cybercriminals.

Извор линк

Најновији чланци

Lessons for Cybersecurity Leaders from Golf

In a recent discussion about the upcoming 2024 Presidents Cup, where Canadian golfer Mackenzie...

Critics slam Chinese study on quantum encryption vulnerability

Infosec experts are debunking claims that Chinese researchers have successfully cracked RSA encryption using...

TN cybercrime police expose fraudulent NCRP website in Chennai

The Tamil Nadu police's cybercrime wing successfully identified and busted a fake National Cybercrime...

Risky Biz News: China accuses US of falsely implicating other countries in espionage operations

In a recent podcast, listeners were treated to a brief update on the latest...

Више овако

Lessons for Cybersecurity Leaders from Golf

In a recent discussion about the upcoming 2024 Presidents Cup, where Canadian golfer Mackenzie...

Critics slam Chinese study on quantum encryption vulnerability

Infosec experts are debunking claims that Chinese researchers have successfully cracked RSA encryption using...

TN cybercrime police expose fraudulent NCRP website in Chennai

The Tamil Nadu police's cybercrime wing successfully identified and busted a fake National Cybercrime...
sr_RSSerbian