New EDR killer software utilized by 8 completely different ransomware teams

3 Min Read
3 Min Read

A brand new endpoint detection and response (EDR) killer, thought-about an evolution of “EdrkillShifter,” developed by Ransomhub, has been noticed in assaults by eight completely different ransomware gangs.

Such instruments will help ransomware operators flip off safety merchandise on compromised techniques, deploy payloads, escalate privileges, try lateral motion, and in the end encrypt units on the community with out detection.

Based on Sophos Safety Researchers, new instruments with no particular title are being utilized by Ransomhub, Blacksuit, Medusa, Qilin, Dragonforce, Crytox, Lynx, and Inc.

The brand new EDR killer software makes use of extremely obfuscated binaries which can be self-replica at runtime and injected into authorized functions.

This software searches for digitally signed (stolen or expired certificates) drivers with random five-character names hard-coded within the executable.

Theft and expired certificates
Theft and expired certificates utilized by malicious drivers
Supply: Sophos

If discovered, the malicious driver shall be loaded into the kernel required to carry out a “bringe your individual weak driver” (BYOVD) assault, reaching the kernel privileges required to show off the safety product.

The motive force pretends to be reliable recordsdata such because the Cloud Strike Falcon Sensor Driver, however when activated, it kills AV/EDR-related processes and stops providers associated to safety instruments.

Goal distributors embody Sophos, Microsoft Defender, Kaspersky, Symantec, Pattern Micro, Sentinelone, Cylance, McAfee, F-Safe, HitmanPro, and Webroot.

The brand new EDR killer software variations differ in driver names, goal AVS, and construct traits, however all of them use heartcrypts for packing, and the proof suggests information and power sharing amongst competing risk teams.

Sophos particularly notes that it’s unlikely that instruments shall be leaked and reused by different risk actors, however they’re unlikely to be developed by a shared co-framework.

See also  Earlier than Nvidia, founder and CEO Jensen Huang designed microprocessors for...

“To be clear, it isn’t {that a} single binary of the EDR killer was leaked and shared amongst risk actors. As a substitute, every assault used a unique construct of its personal instruments,” defined Sophos.

This software sharing tactic, particularly in these associated to EDR Killers, is widespread within the ransomware area.

Aside from EdrkillShifter, Sophos additionally found one other software referred to as Aukill. This was Medusa Locker and Lockbit utilized in assaults.

Sentinelone additionally reported final yr that Fin7 hackers shall be promoting customized “Avneutralizer” instruments to a number of ransomware gangs, together with Blackbusta, Avoslocker, Medusalocker, Blackcat, Trigona and Lockbit.

The entire indicators of compromise related to this new EDR killer software can be found on this GitHub repository.

TAGGED:
Share This Article
Leave a comment