Original Article Text

Click to Toggle View

RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software. The RansomHub ransomware gang has been using TDSSKiller, a legitimate tool from Kaspersky, to disable endpoint detection and response (EDR) services on target systems. After taking down the defenses, RansomHub deployed the LaZagne credential-harvesting tool to extract logins from various application databases that could help move laterally on the network. TDSSKiller abused in ransomware attacks Kaspersky created TDSSKiller as a tool that can scan the system for the presence of rootkits and bootkits, two types of malware that are particularly difficult to detect and can evade standard security tools. EDR agents are more advanced solutions that operate, at least partially, at the kernel level, as they need to monitor and control low-level system activities such as file access, process creation, and network connections, all providing real-time protection against threats like ransomware. Cybersecurity company Malwarebytes reports that they recently observed RansomHub abusing TDSSKiller to interact with kernel-level services using a command line script or batch file that disabled the Malwarebytes Anti-Malware Service (MBAMService) running on the machine. The legitimate tool was employed following the reconnaissance and privilege escalation phase, and executed from a temporary directory (‘C:\Users\<User>\AppData\Local\Temp\’) using a dynamically generated filename (‘{89BCFDFB-BBAF-4631-9E8C-P98AB539AC}.exe’). Being a legitimate tool signed with a valid certificate, TDSSKiller does not risk RansomHub’s attack getting flagged or stopped by security solutions. Next, RansomHub used the LaZagne tool in an attempt to extract credentials stored in databases using LaZagne. In the attack that Malwarebytes investigated, the tool generated 60 file writes that were likely logs of the stolen credentials. The action to delete a file could be the result of the attacker trying to cover their activity on the system. Defending against TDSSKiller Detecting LaZagne is straightforward as most security tools flag it as malicious. However, its activity can become invisible if TDSSKiller is used to deactivate the defenses. TDSSKiller is in a gray area, as some security tools, including Malwarebytes' ThreatDown, label it as ‘RiskWare’, which could also be a red flag to users. The security firm suggests activating the tamper protection feature on the EDR solution, to make sure that attackers can't disable them with tools like TDSSKiller. Additionally, monitoring for the ‘-dcsvc’ flag, the parameter that disables or deletes services, and for the execution of TDSSKiller itself can help detect and block the malicious activity.

Daily Brief Summary

MALWARE // RansomHub Utilizes TDSSKiller to Disable Security and Harvest Credentials

The RansomHub ransomware group is actively exploiting the TDSSKiller tool from Kaspersky to circumvent endpoint detection and response (EDR) systems on affected machines.

Post disabling the EDR services, RansomHub deploys the LaZagne tool to extract credentials from application databases aimed at facilitating lateral movement across networks.

TDSSKiller is designed to detect rootkits and bootkits, making it a powerful utility for both legitimate and malicious purposes.

Malwarebytes observed and reported on the abuse of TDSSKiller in recent RansomHub attacks where the tool is executed using command line scripts to disable critical security services.

The legitimate status and valid certificate of TDSSKiller help prevent the detection of malicious activities by security programs.

Malwarebytes recommends strengthening security by enabling tamper protection on EDR systems and monitoring specific TDSSKiller execution flags to mitigate this attack vector.

The security firm also noted attempts to erase traces of the attack, highlighting the sophistication and stealth of RansomHub’s operations.