Article Details

Scrape Timestamp (UTC): 2024-08-15 10:46:45.756

Source: https://thehackernews.com/2024/08/ransomhub-group-deploys-new-edr-killing.html

Original Article Text

Click to Toggle View

RansomHub Group Deploys New EDR-Killing Tool in Latest Cyber Attacks. A cybercrime group with links to the RansomHub ransomware has been observed using a new tool designed to terminate endpoint detection and response (EDR) software on compromised hosts, joining the likes of other similar programs like AuKill (aka AvNeutralizer) and Terminator. The EDR-killing utility has been dubbed EDRKillShifter by cybersecurity company Sophos, which discovered the tool in connection with a failed ransomware attack in May 2024. "The EDRKillShifter tool is a 'loader' executable – a delivery mechanism for a legitimate driver that is vulnerable to abuse (also known as a 'bring your own vulnerable driver,' or BYOVD, tool)," security researcher Andreas Klopsch said. "Depending on the threat actor's requirements, it can deliver a variety of different driver payloads." RansomHub, a suspected rebrand of the Knight ransomware, surfaced in February 2024, leveraging known security flaws to obtain initial access and drop legitimate remote desktop software such as Atera and Splashtop for persistent access. Last month, Microsoft revealed that the notorious e-crime syndicate known as Scattered Spider has incorporated ransomware strains such as RansomHub and Qilin into its arsenal. Executed via command-line along with a password string input, the executable decrypts an embedded resource named BIN and executes it in memory. The BIN resource unpacks and runs a Go-based final, obfuscated payload, which then takes advantage of different vulnerable, legitimate drivers to gain elevated privileges and disarm EDR software. "The binary's language property is Russian, indicating that the malware author compiled the executable on a computer with Russian localization settings," Klopsch said. "All of the unpacked EDR killers embed a vulnerable driver in the .data section." To mitigate the threat, it's recommended to keep systems up-to-date, enable tamper protection in EDR software, and practice strong hygiene for Windows security roles. "This attack is only possible if the attacker escalates privileges they control, or if they can obtain administrator rights," Klopsch said. "Separation between user and admin privileges can help prevent attackers from easily loading drivers."

Daily Brief Summary

MALWARE // RansomHub Group Enhances Capability with New EDR-Killing Tool

RansomHub, linked to Knight ransomware, utilizes a new tool, EDRKillShifter, to disable endpoint detection and response (EDR) systems.

Sophos identified the tool during a thwarted ransomware attack in May 2024, highlighting its functionality as a loader for exploit-ready drivers.

The tool, indicative of evolving cybercrime tactics, can deliver various driver payloads based on the requirements of the attack.

The executable uses command-line inputs for operation, decrypting and executing payloads that target EDR solutions by exploiting vulnerable drivers.

Microsoft reports that Scattered Spider, a major e-crime group, has adopted RansomHub among other ransomware strains.

The malware displays properties suggesting Russian origins, complicating geopolitical and cyber defense landscapes.

Recommended defenses include regular system updates, enabling EDR tamper protection, and stringent admin/user privilege separation to mitigate such threats.