Unauthorized Users Exploit EDRSilencer Tool to Circumvent Security and Conceal Malicious Behavior

October 16, 2024Ravie LakshmananEndpoint Security / Malware

Threat actors are endeavoring to misuse the open-source EDRSilencer tool in their attempts to manipulate endpoint detection and response (EDR) solutions and cover up malicious behavior.

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

October 16, 2024Ravie LakshmananEndpoint Security / Malware

Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity

Threat actors are endeavoring to misuse the open-source EDRSilencer tool in their attempts to manipulate endpoint detection and response (EDR) solutions and cover up malicious behavior.

According to Trend Micro, it observed “threat actors trying to incorporate EDRSilencer in their assaults, repurposing it as a technique to elude detection.”

EDRSilencer, inspired by the NightHawk FireBlock tool from MDSec, is engineered to obstruct outbound traffic of operating EDR processes using the Windows Filtering Platform (WFP).

It facilitates the termination of diverse processes linked to EDR products from Microsoft, Elastic, Trellix, Qualys, SentinelOne, Cybereason, Broadcom Carbon Black, Tanium, Palo Alto Networks, Fortinet, Cisco, ESET, HarfangLab, and Trend Micro.

Cybersecurity

By incorporating such lawful red teaming tools into their inventory, the aim is to render EDR software ineffectual and significantly complicate the identification and elimination of malware.

“The WFP is a potent framework integrated within Windows for formulating network filtering and security applications,” articulated Trend Micro researchers stated. “It furnishes APIs for developers to specify custom regulations to monitor, block, or adjust network traffic based on diverse criteria such as IP addresses, ports, protocols, and applications.”

“WFP is harnessed in firewalls, antivirus software, and other security solutions to safeguard systems and networks.”

Unauthorized Users Exploit EDRSilencer Tool

EDRSilencer leverages WFP by dynamically identifying running EDR processes and generating continual WFP filters to obstruct their outbound network communications on both IPv4 and IPv6, thereby preventing security software from dispatching telemetry to their management consoles.

The attack essentially commences by scanning the system to amass a list of functioning processes associated with prevalent EDR products, then executing EDRSilencer with the parameter “blockedr” (e.g., EDRSilencer.exe blockedr) to restrict outbound traffic from those processes through configuring WFP filters.

“This enables malware or other malicious activities to stay concealed, heightening the likelihood of prosperous attacks without detection or intervention,” underscored the researchers. “This underscores the ongoing tendency of threat actors to seek more potent tools for their assaults, particularly those devised to incapacitate antivirus and EDR solutions.”

Cybersecurity

This development coincides with ransomware groups employing potent EDR-disabling tools like AuKill (aka AvNeutralizer), EDRKillShifter, TrueSightKiller, GhostDriver, and Terminator witnessing an uptick, with these tools weaponizing vulnerable drivers to escalate privileges and terminate security-related processes.

“EDRKillShifter enhances persistence mechanisms by employing techniques that ensure its continuous presence within the system, even after initial compromises are discovered and cleaned,” Trend Micro mentioned in a recent analysis.

“It dynamically disrupts security processes in real-time and adapts its methods as detection capabilities evolve, staying a step ahead of traditional EDR tools.”

Found this article intriguing? Follow us on Twitter and LinkedIn for further exclusive content we publish.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.