RansomHub Operators Employ Novel Malware to Disable EDR Protection

CyberSecureFox 🦊

Cybersecurity experts have uncovered a new malicious tool called EDRKillShifter, employed by RansomHub ransomware operators to circumvent Endpoint Detection and Response (EDR) solutions. This sophisticated malware utilizes the increasingly prevalent Bring Your Own Vulnerable Driver (BYOVD) attack technique to elevate privileges, disable security measures, and seize control of target systems.

Anatomy of EDRKillShifter: A Three-Stage Attack

EDRKillShifter operates in three distinct stages, demonstrating a high level of complexity and evasion capabilities:

  1. Initial Execution: The attacker launches the EDRKillShifter binary with a decryption password, which then decrypts and executes an embedded resource named “BIN” in memory.
  2. Payload Unpacking: The decrypted code unpacks and executes the final payload.
  3. Privilege Escalation and EDR Disabling: The payload loads a vulnerable legitimate driver to elevate privileges and disable active EDR processes and services on the victim’s system.

Exploitation of Legitimate Drivers

Sophos researchers identified two distinct malware samples utilizing proof-of-concept exploits available on GitHub. One sample exploited the vulnerable RentDrv2 driver, while the other targeted the ThreatFireMonitor driver, a component of an outdated system monitoring package. This approach of leveraging legitimate but vulnerable drivers is a hallmark of BYOVD attacks, making detection and prevention more challenging for security solutions.

Continuous Process Termination

After successfully loading the vulnerable driver, EDRKillShifter enters an infinite loop, continuously scanning running processes and terminating those listed in its hardcoded target list. This aggressive approach ensures that security processes remain disabled, providing the attackers with prolonged access to the compromised system.

Implications for Cybersecurity

The emergence of EDRKillShifter highlights several critical points for cybersecurity professionals and organizations:

  • The growing sophistication of ransomware operators and their tools
  • The persistent threat posed by vulnerable drivers, even when signed and seemingly legitimate
  • The importance of multi-layered security approaches that don’t rely solely on EDR solutions

Mitigation Strategies

To protect against EDRKillShifter and similar BYOVD attacks, Sophos recommends the following measures:

  • Enable tamper protection features in endpoint security products
  • Implement strict user and administrator rights segregation to prevent unauthorized driver loading
  • Keep systems up-to-date, as Microsoft regularly revokes signatures for drivers known to be exploited in attacks
  • Employ application whitelisting and other advanced security controls to prevent the execution of unknown binaries

The discovery of EDRKillShifter serves as a stark reminder of the ever-evolving threat landscape in cybersecurity. As attackers continue to develop more sophisticated tools and techniques, organizations must remain vigilant, continuously updating their security posture and adopting a proactive approach to threat detection and mitigation. By staying informed about emerging threats like EDRKillShifter and implementing robust security measures, businesses can better protect themselves against the growing menace of ransomware and other cyber attacks.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.