Sophos Discovers an EDR Killer Malware For Sale and In Use

We’ve got a new player in the malware game that’s making waves, and it’s called EDRKillShifter. If you’re in the cybersecurity world, this is something you need to know about. Let’s dive into the top 10 things you need to know about this latest threat.

1. Meet EDRKillShifter: The New Sheriff in Malware Town 
Sophos analysts recently uncovered this new utility, EDRKillShifter, being used by ransomware gangs to take out endpoint detection and response (EDR) systems. It’s like the latest weapon in their arsenal, and it’s got everyone talking.

2. Malware’s Own Delivery Service 
EDRKillShifter acts as the delivery man for vulnerable drivers that disable endpoint protection. Think of it as the Uber Eats of malware—except instead of delivering your favorite meal, it serves up a disabled security system.

3. The Three-Step Attack Plan 
EDRKillShifter’s attack method is straightforward:
– Step 1: The attacker enters a secret password and hits execute.
– Step 2: The tool decrypts its hidden payload.
– Step 3: A Go-based package emerges, exploiting a driver vulnerability to unhook your EDR. Just like that, your defenses are down.

4. Russian Fingerprints All Over It 
There are strong indicators that this malware has Russian origins. The original filename is Loader.exe, it masquerades as a product called ARK-Game, and the development environment shows signs of Russian localization. It’s hard to call that a coincidence.

5. A Chameleon in Code 
EDRKillShifter employs self-modifying code in its second stage to evade analysis. It’s like a chameleon, constantly changing to avoid detection and analysis. This is one slippery piece of malware.

6. Different Payloads, Same Goal 
While the final payloads might look different each time, they all aim to do the same thing: exploit a vulnerable driver and disable your EDR. The goal is to leave your systems defenseless.

7. Open-Source Exploits 
The exploit code for these driver vulnerabilities is openly available on GitHub. Malware authors are simply copying and pasting this code into their own malicious creations. It’s a reminder that open-source can be a double-edged sword.

8. A Malware Assembly Line 
Sophos suspects that there may be a mastermind behind EDRKillShifter, selling the loader on the dark web while script kiddies create the final payloads. It’s like a well-oiled malware assembly line, churning out threats at scale.

9. Sophos is on the Case 
Don’t panic just yet—Sophos products detect EDRKillShifter as Troj/KillAV-KG, and their behavioral protection rules can block its most dangerous moves. They’re already a step ahead in this cat-and-mouse game.

10. How to Protect Yourself 
To safeguard your systems from EDRKillShifter:
– Enable tamper protection in your endpoint security.
– Separate admin and user accounts to minimize risk.
– Stay up-to-date with Microsoft’s driver de-certification patches to close off vulnerabilities.

So, there you have it—EDRKillShifter is the latest and greatest in the realm of EDR-killing malware. But with the right knowledge and defenses, we can keep it at bay. Stay vigilant and stay safe out there!

References:
https://news.sophos.com/en-us/2024/08/14/edr-kill-shifter/

* AI tools were used as a research assistant for this content.

Leave a comment