Ransomware gang deploys new malware to kill security software

Teilen:

RansomHub ransomware operators are now deploying new malware to disable Endpoint Detection and Response (EDR) security software in Bring Your Own Vulnerable Driver (BYOVD) attacks.

Named EDRKillShifter by Sophos security researchers who discovered it during a May 2024 ransomware investigation, the malware deploys a legitimate, vulnerable driver on targeted devices to escalate privileges, disable security solutions, and take control of the system.

This technique is very popular among various threat actors, ranging from financially motivated ransomware gangs to state-backed hacking groups.

“During the incident in May, the threat actors – we estimate with moderate confidence that this tool is being used by multiple attackers — attempted to use EDRKillShifter to terminate Sophos protection on the targeted computer, but the tool failed,” said Sophos threat researcher Andreas Klopsch.

“They then attempted to run the ransomware executable on the machine they controlled, but that also failed when the endpoint agent’s CryptoGuard feature was triggered.”

While investigating, Sophos discovered two different samples, both with proof-of-concept exploits available on GitHub: one exploiting a vulnerable driver known as RentDrv2 and another exploiting a driver called ThreatFireMonitor, a component of a deprecated system-monitoring package.

Sophos also found that EDRKillShifter can deliver various driver payloads based on the attackers’ needs and that the malware’s language property suggests it was compiled on a computer with Russian localization.

The loader’s execution involves three steps: first, the attacker launches the EDRKillShifter binary with a password string to decrypt and execute an embedded resource named BIN in memory. This code then unpacks and executes the final payload, which drops and exploits a vulnerable, legitimate driver to escalate privileges and disable active EDR processes and services.

“After the malware creates a new service for the driver, starts the service, and loads the driver, it enters an endless loop that continuously enumerates the running processes, terminating processes if their name appears in a hardcoded list of targets,” Klopsch added.

“It is also worth noting that both variants exploit legitimate (though vulnerable) drivers, using proof-of-concept exploits available on Github. We suspect that the threat actors copied portions of these proofs-of-concept, modified them, and ported the code to the Go language.”

Sophos recommends enabling tamper protection in endpoint security products, maintaining a separation between user and admin privileges to prevent attackers from loading vulnerable drivers, and keeping systems updated, given that Microsoft keeps de-certifying signed drivers known to have been misused in previous attacks.

Last year, Sophos spotted another EDR-killing malware, dubbed AuKill, which abused a vulnerable Process Explorer driver in Medusa Locker and LockBit ransomware attacks. AuKill is similar to an open-source tool known as Backstab, which also exploits a vulnerable Process Explorer driver and has been used by the LockBit gang in at least one attack observed by Sophos X-Ops.

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
11:07 pm, März 26, 2025
Wetter-Symbol 9°C
L: 7° | H: 9°
klarer Himmel
Luftfeuchtigkeit: 81 %
Druck: 1024 mb
Wind: 6 mph SSW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 7%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 5:49 am
Sonnenuntergang: 6:22 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Tomorrow 9:00 pm
Wetter-Symbol
7° | 9°°C 0 mm 0% 9 mph 88 % 1024 mb 0 mm/h
Fr. März 28 9:00 pm
Wetter-Symbol
7° | 11°°C 1 mm 100% 12 mph 91 % 1015 mb 0 mm/h
Sa. März 29 9:00 pm
Wetter-Symbol
4° | 12°°C 0 mm 0% 10 mph 81 % 1025 mb 0 mm/h
So. März 30 9:00 pm
Wetter-Symbol
5° | 14°°C 0 mm 0% 8 mph 76 % 1029 mb 0 mm/h
Mo. März 31 9:00 pm
Wetter-Symbol
9° | 17°°C 0 mm 0% 4 mph 84 % 1030 mb 0 mm/h
Tomorrow 12:00 am
Wetter-Symbol
9° | 10°°C 0 mm 0% 4 mph 80 % 1024 mb 0 mm/h
Tomorrow 3:00 am
Wetter-Symbol
9° | 9°°C 0 mm 0% 4 mph 84 % 1024 mb 0 mm/h
Tomorrow 6:00 am
Wetter-Symbol
8° | 8°°C 0 mm 0% 4 mph 88 % 1023 mb 0 mm/h
Tomorrow 9:00 am
Wetter-Symbol
11° | 11°°C 0 mm 0% 6 mph 68 % 1023 mb 0 mm/h
Tomorrow 12:00 pm
Wetter-Symbol
16° | 16°°C 0 mm 0% 7 mph 50 % 1020 mb 0 mm/h
Tomorrow 3:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 9 mph 45 % 1018 mb 0 mm/h
Tomorrow 6:00 pm
Wetter-Symbol
15° | 15°°C 0 mm 0% 8 mph 61 % 1017 mb 0 mm/h
Tomorrow 9:00 pm
Wetter-Symbol
11° | 11°°C 0 mm 0% 8 mph 76 % 1017 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€80,857.93
-0.77%
Ethereum(ETH)
€1,863.14
-3.02%
Fesseln(USDT)
€0.93
-0.01%
XRP(XRP)
€2.18
-4.04%
Solana(SOL)
€127.39
-4.67%
USDC(USDC)
€0.93
-0.01%
Dogecoin(DOGE)
€0.181508
2.68%
Shiba Inu(SHIB)
€0.000013
2.89%
Pepe(PEPE)
€0.000007
5.43%
Peanut das Eichhörnchen(PNUT)
€0.214428
7.85%
Nach oben scrollen