A new proof-of-concept tool named EDR-Freeze has been developed temporarily disable Endpoint Detection and Response (EDR) and antivirus programs by putting them into a "coma" state. According to Zero Salarium, this method uses a native Windows function, providing a stealthier alternative to the increasingly common Bring Your Own Vulnerable Driver (BYOVD) attacks that threat actors use to disable security software. Unlike BYOVD, which requires installing vulnerable drivers on the system, EDR-Freeze leverages legitimate Windows components. This approach eliminates the need for third-party drivers, minimizing the risk of system instability and detection. The key to EDR-Freeze lies in manipulating the MiniDumpWriteDump function within the Windows DbgHelp library, which creates minidump a snapshot of a process's memory for debugging. The EDR-Freeze developer found a way to extend this suspension indefinitely. The main challenges were to prolong the very short MiniDumpWriteDump execution time and bypass Protected Process Light (PPL) security feature that protects EDR and antivirus processes from interference. By supplying specific parameters, WerFaultSecure.exe can be directed to trigger MiniDumpWriteDump on any target process, including protected security agents. WerFaultSecure.exe is launched with arguments to create a memory dump of the target EDR or antivirus process. EDR-Freeze monitors the target process. As a result, the security software remains indefinitely suspended and effectively disabled until WerFaultSecure.exe is terminated. The developer has publicly released the EDR-Freeze tool, which requires two parameters: the Process ID (PID) of the target and the suspension duration in milliseconds. This allows attackers to deactivate security tools, carry out malicious activities, and then the security software resume as if undisturbed. In tests on Windows 11 24H2, the tool successfully suspended Windows Defender's MsMpEng.exe process. For defenders, detecting this attack involves monitoring for unusual executions of WerFaultSecure.exe, especially if it targets sensitive PIDs like lsass.exe or EDR agents, which should trigger immediate investigation.
Researchers at Cofense Intelligence found the campaign of group Lone None distributing advanced malware in the form of spoofed copyright takedown notices. The campaign delivers the...
A widespread security issue has been uncovered in mobile apps using Firebase, where misconfigured services expose sensitive user data to unauthenticated attackers. First disclosed ...
A new phishing campaign is targeting PyPI maintainers using deceptive emails that mimic official PyPI communications. These emails, crafted to look like account verification reques...