КућаСајбер БалканHackers Exploit EDRSilencer Red Team Tool for Evasion of Detection

Hackers Exploit EDRSilencer Red Team Tool for Evasion of Detection

Објављено на

spot_img

A recent development in the cybersecurity landscape involves the emergence of EDRSilencer, a red team tool designed to disrupt EDR (Endpoint Detection and Response) solutions by blocking network communication for associated processes using the Windows Filtering Platform (WFP). This interference complicates the identification and removal of malware, as EDRs are unable to send telemetry or alerts due to the communication blockage.

The tool operates by leveraging the WFP framework to create custom rules that monitor and modify network traffic, effectively impeding EDRs from communicating with their cloud-based infrastructure. By blocking outbound network communications from running EDR processes, EDRSilencer prevents the transmission of telemetry or alerts, thus rendering the EDR less effective in detecting and responding to cyber threats.

EDR products typically use various executable files, such as agent processes, service components, and scanning utilities, to monitor system activity, detect threats, and provide real-time protection against cyberattacks. However, the introduction of tools like EDRSilencer poses a significant challenge to the effectiveness of these security solutions.

In addition to EDRSilencer, another tool known as EDRNoiseMaker was used to validate the efficacy of EDRSilencer by identifying silent processes based on WFP filters. This combination of tools highlights the potential impact on the functionality of EDR solutions if network communications are disrupted by malicious actors.

EDRSilencer offers users the ability to block or unblock network traffic for specific processes or all EDR processes using WFP filters that persist even after system restarts. This granular control over network access allows users to customize their approach to blocking network traffic, either for individual processes or all EDR processes collectively.

Despite attempts to block specific processes using EDRSilencer, certain executable files were able to bypass the restrictions, highlighting the evolving nature of cybersecurity threats. Moreover, the tool’s success in preventing log collection when a ransomware binary was executed demonstrates its potential impact on endpoint security.

Overall, the emergence of tools like EDRSilencer underscores the need for organizations to adopt advanced detection mechanisms and threat-hunting strategies to protect their digital assets. As threat actors continue to exploit vulnerabilities in EDR solutions, organizations must remain vigilant and proactive in safeguarding their systems against evolving cyber threats.

Извор линк

Најновији чланци

Iranian APT34 Exploits Microsoft Exchange

An increase in cyber espionage activities targeting government entities in the Gulf region, particularly...

Fortinet Edge Devices Targeted by Cyber Attacks – Once More

Hackers potentially reverse-engineered a patch issued in February for Fortinet gateway devices, prompting a...

Company targeted by cyber attack after unknowingly hiring North Korean hacker

A recent cyber attack on a company has shed light on the dangers of...

Permission Denied

The European Union (EU) has been making significant changes to its cybersecurity regulations, specifically...

Више овако

Iranian APT34 Exploits Microsoft Exchange

An increase in cyber espionage activities targeting government entities in the Gulf region, particularly...

Fortinet Edge Devices Targeted by Cyber Attacks – Once More

Hackers potentially reverse-engineered a patch issued in February for Fortinet gateway devices, prompting a...

Company targeted by cyber attack after unknowingly hiring North Korean hacker

A recent cyber attack on a company has shed light on the dangers of...
sr_RSSerbian