EDRSilencer Exploited by Threat Actors to Evade Detection and Disable Security Alerts
EDRSilencer, a tool traditionally used in red-team operations, is now being exploited by malicious actors to bypass security measures and evade detection. This open-source endpoint detection and response (EDR) tool identifies EDR processes on systems and uses the Windows Filtering Platform (WFP) to manipulate network traffic. Capable of blocking 16 common EDR tools, such as Microsoft Defender, SentinelOne, and Cortex XDR, EDRSilencer is being repurposed by attackers to disrupt communication between security systems and management servers. This tactic enables stealthier ransomware attacks and operational disruptions by muting alerts and avoiding detection, according to TrendMicro researchers.
https://www.darkreading.com/endpoint-security/bad-actors-manipulate-red-team-tools-evade-detection
Comments
Post a Comment