New 'Defendnot' Tool Exploits Windows API to Disable Microsoft Defender

A newly released tool named 'Defendnot' can disable Microsoft Defender on Windows systems by registering a fake antivirus product through an undocumented Windows Security Center (WSC) API. Developed by researcher es3n1n, Defendnot creates a dummy antivirus DLL and injects it into a trusted system process like Taskmgr.exe, allowing it to bypass security checks and trick Windows into deactivating Defender. Unlike its predecessor 'no-defender', which faced a DMCA takedown for using third-party antivirus code, Defendnot is built from scratch to avoid copyright issues. The tool includes a loader for configuration and establishes persistence via Windows Task Scheduler, raising concerns about potential misuse to leave systems unprotected. 

https://www.bleepingcomputer.com/news/microsoft/new-defendnot-tool-tricks-windows-into-disabling-microsoft-defender

Comments

Popular posts from this blog

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities

OWASP SAMM Skills Framework Enhances Software Security Roles