Article Details
Scrape Timestamp (UTC): 2025-05-17 14:12:29.148
Original Article Text
Click to Toggle View
New 'Defendnot' tool tricks Windows into disabling Microsoft Defender. A new tool called 'Defendnot' can disable Microsoft Defender on Windows devices by registering a fake antivirus product, even when no real AV is installed. The trick utilizes an undocumented Windows Security Center (WSC) API that antivirus software uses to tell Windows it is installed and is now managing the real-time protection for the device. When an antivirus program is registered, Windows automatically disables Microsoft Defender to avoid conflicts from running multiple security applications on the same device. The Defendnot tool, created by researcher es3n1n, abuses this API by registering a fake antivirus product that meets all of Windows' validation checks. The tool is based on a previous project called no-defender, which used code from a third-party antivirus product to spoof registration with WSC. That earlier tool was pulled from GitHub after the vendor filed a DMCA takedown. "Then, after a few weeks after the release, the project blew up quite a bit and gained ~1.5k stars, after that the developers of the antivirus I was using filed a DMCA takedown request and I didn't really want to do anything with that so just erased everything and called it a day," the developer explains in a blog post. Defendnot avoids copyright issues by building the functionality from scratch through a dummy antivirus DLL. Normally, WSC API is safeguarded through Protected Process Light (PPL), valid digital signatures, and other features. To bypass these requirements, Defendnot injects its DLL into a system process, Taskmgr.exe, that is signed and already trusted by Microsoft. From within that process, it can register the dummy antivirus with a spoofed display name. Once registered, Microsoft Defender immediately shuts itself off, leaving no active protection on the device. The tool also includes a loader that passes configuration data via a ctx.bin file and lets you set the antivirus name you want to use, turn off registration, and enable verbose logging. For persistence, Defendnot creates an autorun through the Windows Task Scheduler so that it starts when you log in to Windows. While Defendnot is considered a research project, the tool demonstrates how trusted system features can be manipulated to turn off security features. Microsoft Defender is currently detecting and quarantining Defendnot as a 'Win32/Sabsik.FL.!ml; detection. Top 10 MITRE ATT&CK© Techniques Behind 93% of Attacks Based on an analysis of 14M malicious actions, discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.
Daily Brief Summary
'Defendnot' is a new tool capable of turning off Microsoft Defender by registering a deceptive antivirus on Windows systems.
This tool exploits an undocumented API within Windows Security Center to fool the system into recognizing a fake antivirus product.
Developed by researcher es3n1n, Defendnot succeeds a similar project that was previously taken down due to copyright issues.
Defendnot bypasses enhanced security protocols by injecting its code into a trusted system process, Taskmgr.exe, to mimic legit software registration.
Once activated, Microsoft Defender shuts down automatically as Windows avoids running multiple antivirus applications simultaneously, leaving systems unprotected.
The tool also ensures persistence by creating an autorun task in Windows, activating upon user login.
Microsoft is currently identifying and blocking Defendnot as malware under the signature 'Win32/Sabsik.FL.!ml.'
While presented as a research project, Defendnot highlights vulnerabilities within trusted system processes that can be exploited to disable crucial security defenses.