By following attacker workflows, we identified how affiliates reuse the same vulnerable drivers across unrelated codebases and how individual EDR killers switch drivers over time, demonstrating that driver-centric attribution is unreliable.
We emphasize that in RaaS gangs, it is the affiliates, not the operators, who select and deploy the EDR killers, complicating defense strategies, but also revealing otherwise hidden affiliations.
Our research highlights a significant rise in commercialized tooling, including packer-as-a-service ecosystems and hardened EDR killers that incorporate encrypted drivers, obfuscation, and external payload staging.
Based on these findings and the difficulties of driver blocking, we emphasize a prevention-first approach to defense that focuses on stopping the user-mode component of the EDR killer before any vulnerable driver is loaded, rather than relying solely on kernel-level blocking.
IoCs are available in our GitHub repo: github.com/eset/malware-ioc/tr…
EDR killers explained: Beyond the drivers
ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers.www.welivesecurity.com
reshared this
VulpesZerda
in reply to Lorenzo • • •Ho trovato questo articolo interessante:
ilsoftware.it/system76-critica…
mi chiedo, e se tutti mentissimo sulla nostra età? autodichiarando una identità informatica falsa a livello di SO? tipo 80 anni.
System76 avverte: verifica età nei sistemi operativi può limitare Linux e PC
Michele Nasi (IlSoftware.it)Lorenzo likes this.
Lorenzo
in reply to VulpesZerda • •@VulpesZerda
Già lo facciamo 🤣
GNU/Linux Italia reshared this.