EDRSilencer Exploited by Threat Actors to Evade Detection and Disable Security Alerts

 EDRSilencer, a tool traditionally used in red-team operations, is now being exploited by malicious actors to bypass security measures and evade detection. This open-source endpoint detection and response (EDR) tool identifies EDR processes on systems and uses the Windows Filtering Platform (WFP) to manipulate network traffic. Capable of blocking 16 common EDR tools, such as Microsoft Defender, SentinelOne, and Cortex XDR, EDRSilencer is being repurposed by attackers to disrupt communication between security systems and management servers. This tactic enables stealthier ransomware attacks and operational disruptions by muting alerts and avoiding detection, according to TrendMicro researchers.

https://www.darkreading.com/endpoint-security/bad-actors-manipulate-red-team-tools-evade-detection

Comments

Popular posts from this blog

Endor Labs Announces Integrated SAST Offerings

The Hidden Cost of DevSecOps: Time and Financial Burden of Security on Developers

OWASP Releases Enhanced Dependency-Check Tool with Advanced Tagging and Policy Management Features