Security news is often sober, especially as of late. Many huge data breaches have come to light this year alone, and security vulnerabilities keep coming at us, too—like this week’s report about a massive issue with Secure Boot, one of the core methods used to keep your PC safe from sneaky attacks…
Security news is often sober, especially as of late. Many huge data breaches have come to light this year alone, and security vulnerabilities keep coming at us, too—like this week’s report about a massive issue with Secure Boot, one of the core methods used to keep your PC safe from sneaky attacks… Read More
I review a lot of laptops and I’ve noticed many of them come with a “free trial” of McAfee antivirus preinstalled. I’ve clicked through so many warnings about how my PC will be “at risk” unless I pay up for extended protection, and those McAfee alerts are in a stark red color that’s surely designed
Published
2 days ago
in
By
I review a lot of laptops and I’ve noticed many of them come with a “free trial” of McAfee antivirus preinstalled. I’ve clicked through so many warnings about how my PC will be “at risk” unless I pay up for extended protection, and those McAfee alerts are in a stark red color that’s surely designed to scare me… Read More
Macworld Mac users, we get it—you don’t like bloated, ugly antivirus software slowing down your beautifully tuned machines. But you also don’t want to be the one person who ignores modern cyber threats just because “Macs don’t get viruses.” Spoiler: they can and they do. If you’re looking for a lightweight…
Published
6 days ago
in
By
Macworld
Mac users, we get it—you don’t like bloated, ugly antivirus software slowing down your beautifully tuned machines. But you also don’t want to be the one person who ignores modern cyber threats just because “Macs don’t get viruses.” Spoiler: they can and they do.
EDRKillShifter is getting a dangerous upgrade The new malware can disable AV and EDR from reputable vendors Sophos, Bitdefender, and Kaspersky among the tools being targeted Cybercriminals appear to have improved their antivirus-killing capabilities, as recent research suggest a new tool being shared within the underground community. In a new report, security researchers from Sophos
Published
2 weeks ago
in
By
EDRKillShifter is getting a dangerous upgrade
The new malware can disable AV and EDR from reputable vendors
Sophos, Bitdefender, and Kaspersky among the tools being targeted
Cybercriminals appear to have improved their antivirus-killing capabilities, as recent research suggest a new tool being shared within the underground community.
In a new report, security researchers from Sophos said multiple ransomware groups are successfully disabling endpoint detection and response (EDR) systems before deploying the encryptor.
Originally, the group known as RansomHub developed a tool called EDRKillShifter, which Sophos says is now made obsolete thanks to this new and improved variant. The new tool can disable security software from multiple high-end vendors such as Sophos, Bitdefender, and Kaspersky.
You may like
This devious ransomware is able to hijack your system to turn off antivirus
Hackers can turn off Windows Defender with this sneaky new tool
This top security platform is being hacked to carry out malware threats
Shifting strategies
The malware is often packed using a service called HeartCrypt, which obfuscates the code to evade detection.
Sophos found the attackers are using all sorts of obfuscation and anti-analysis techniques to protect their tools from security defenders, and in some cases, they’re even using signed drivers (either stolen or compromised).
In one case, the malicious code was embedded inside a legitimate utility, Beyond Compare’s Clipboard Compare tool, the researchers explained.
Sophos also said that multiple ransomware groups are using this new EDR-killing tool, suggesting a high level of collaboration between players.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
EDRKillShifter was first spotted in mid-2024, after a failed attempt to disable an antivirus and deploy ransomware.
Sophos then uncovered that the malware dropped a legitimate, but vulnerable driver.
Now, it seems there is a new method – taking an already legitimate executable and modifying it locally by inserting malicious code and payload resources (as was the case with Beyond Compare’s tool). This is often done after the attacker has access to a