Article Details

Scrape Timestamp (UTC): 2024-10-16 16:25:14.356

Source: https://thehackernews.com/2024/10/hackers-abuse-edrsilencer-tool-to.html

Original Article Text

Click to Toggle View

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity. Threat actors are attempting to abuse the open-source EDRSilencer tool as part of efforts to tamper endpoint detection and response (EDR) solutions and hide malicious activity. Trend Micro said it detected "threat actors attempting to integrate EDRSilencer in their attacks, repurposing it as a means of evading detection." EDRSilencer, inspired by the NightHawk FireBlock tool from MDSec, is designed to block outbound traffic of running EDR processes using the Windows Filtering Platform (WFP). It supports terminating various processes related to EDR products from Microsoft, Elastic, Trellix, Qualys, SentinelOne, Cybereason, Broadcom Carbon Black, Tanium, Palo Alto Networks, Fortinet, Cisco, ESET, HarfangLab, and Trend Micro. By incorporating such legitimate red teaming tools into their arsenal, the goal is to render EDR software ineffective and make it a lot more challenging to identify and remove malware. "The WFP is a powerful framework built into Windows for creating network filtering and security applications," Trend Micro researchers said. "It provides APIs for developers to define custom rules to monitor, block, or modify network traffic based on various criteria, such as IP addresses, ports, protocols, and applications." "WFP is used in firewalls, antivirus software, and other security solutions to protect systems and networks." EDRSilencer takes advantage of WFP by dynamically identifying running EDR processes and creating persistent WFP filters to block their outbound network communications on both IPv4 and IPv6, thereby preventing security software from sending telemetry to their management consoles. The attack essentially works by scanning the system to gather a list of running processes associated with common EDR products, followed by running EDRSilencer with the argument "blockedr" (e.g., EDRSilencer.exe blockedr) to inhibit outbound traffic from those processes by configuring WFP filters. "This allows malware or other malicious activities to remain undetected, increasing the potential for successful attacks without detection or intervention," the researchers said. "This highlights the ongoing trend of threat actors seeking more effective tools for their attacks, especially those designed to disable antivirus and EDR solutions." The development comes as ransomware groups' use of formidable EDR-killing tools like AuKill (aka AvNeutralizer), EDRKillShifter, TrueSightKiller, GhostDriver, and Terminator is on the rise, with these programs weaponizing vulnerable drivers to escalate privileges and terminate security-related processes. "EDRKillShifter enhances persistence mechanisms by employing techniques that ensure its continuous presence within the system, even after initial compromises are discovered and cleaned," Trend Micro said in a recent analysis. "It dynamically disrupts security processes in real-time and adapts its methods as detection capabilities evolve, staying a step ahead of traditional EDR tools."

Daily Brief Summary

MALWARE // Hackers Exploit EDRSilencer to Evade Security and Conceal Malware

Threat actors are repurposing the open-source EDRSilencer tool to bypass endpoint detection and response (EDR) systems, facilitating undetected malicious activities.

EDRSilencer disables EDR solutions by blocking their outbound traffic using the Windows Filtering Platform (WFP), undermining their ability to communicate with management consoles.

The tool affects a wide range of EDR products from prominent companies like Microsoft, Palo Alto Networks, SentinelOne, and Trend Micro among others.

By employing such tools, hackers aim to compromise the effectiveness of EDR systems, increasing the chances of successful malware deployment and persistence.

The misuse of EDRSilencer highlights a broader trend among ransomware groups who increasingly utilize sophisticated methods to neutralize antivirus and EDR defenses.

Additional advanced EDR-killing tools like AuKill and TrueSightKiller are also mentioned, underlining their evolving tactics to remain undetectable.

Trend Micro emphasizes the growing sophistication of threat actors in adapting their techniques beyond traditional security detections.

The strategic implementation of WFP rules to dynamically target and disrupt security processes marks a significant escalation in cyber threats, requiring enhanced defense strategies.