gbhackers.com Open in urlscan Pro
172.233.149.136  Public Scan

Submitted URL: https://t.co/1QBGigO9F5
Effective URL: https://gbhackers.com/ransomhub-ransomware-edr-bypass/
Submission: On October 07 via api from IN — Scanned from CA

Form analysis 1 forms found in the DOM

GET https://gbhackers.com/

<form method="get" class="tdb-search-form" action="https://gbhackers.com/">
  <div class="tdb-search-form-inner"><input class="tdb-head-search-form-input" placeholder=" " type="text" value="" name="s" autocomplete="off"><button class="wpb_button wpb_btn-inverse btn tdb-head-search-form-btn" title="Search"
      type="submit"><span> Search</span></button></div>
</form>

Text Content

gbhackers.

Monday, October 7, 2024
Facebook
Instagram
Twitter
gbhackers.
 * Home
 * Threats
 * Cyber Attack
 * Data Breach
 * Vulnerability
 * What is
 * DFIR
 * Top 10

Search

Follow us On Linkedin

HomeCVE/vulnerabilityRansomHub Ransomware Using Multiple Techniques To Disable
EDR And Antivirus


RANSOMHUB RANSOMWARE USING MULTIPLE TECHNIQUES TO DISABLE EDR AND ANTIVIRUS



CVE/vulnerabilityCyber Security NewsRansomware

Published on

September 26, 2024
By Aman Mishra


DECODING COMPLIANCE WITH CISOS

The RansomHub ransomware group tracked as Water Bakunawa, employs targeted
spear-phishing to exploit the Zerologon vulnerability, allowing them to gain
unauthorized access to networks, affecting various industries and critical
infrastructure sectors, demanding ransom payments for data release. 

The group’s recent integration of EDRKillShifter, a tool designed to evade
detection and disrupt security processes, poses a significant threat to endpoint
security, whose ability to dynamically disable EDR solutions and ensure
persistence makes it a formidable adversary for traditional security measures.

The infection chain of the RansomHub utilizing EDRKillShifter

A ransomware group typically gains initial access to systems by exploiting
vulnerabilities, phishing, or password spraying. A compromised user account was
the primary entry point in a specific incident, with multiple spear phishing
attempts detected. 

- Advertisement -

Free Webinar on How to Protect Small Businesses Against Advanced
Cyberthreats -> Free Registration

The Zerologon vulnerability was identified as a potential access vector, as the
Vision One telemetry dataset revealed detections indicating the abuse of
elevation control mechanisms, further suggesting the presence of malicious
activity.

232.bat performing brute force

RansomHub’s evasion tactics employed four batch scripts to disable security
measures and facilitate unauthorized access, as 232.bat used password spraying
and disabled Windows Defender. 

Tdsskiller.bat modified the registry, terminated processes, and disabled Trend
Micro’s antivirus service, and Killdeff.bat, an obfuscated PowerShell script,
manipulated Windows Defender settings and attempted privilege escalation. 



LogDel.bat altered file attributes, modified RDP settings, and cleared Windows
Event Logs to hinder forensic analysis, which compromised system security and
enabled RansomHub to execute its malicious payload.

The command used to remove system and hidden attributes of Default.rdp via
Attrib.exe

The EDRKillShifter tool, a BYOVD loader, uses a password-protected command line
to execute and decrypt an embedded resource named “data.bin,” and then unpacks
and executes a second-stage payload, which further decrypts the final payload
containing the Gobinary and a vulnerable driver. 

The loader deploys and exploits the vulnerable driver to gain elevated
privileges. This allows it to terminate specific antivirus applications listed
in an IoC text file by creating a Windows service named KB20240815 to persist on
the system.

EDRKillShifter dropping the vulnerable driver

RansomHub employed a multi-stage attack, starting with credential theft using
Taskmgr.exe to dump LSASS memory and then conducting covert network
reconnaissance with NetScan, laterally moving using SMB/Windows Admin Shares. 

AnyDesk served as their C&C infrastructure, while rclone was used to exfiltrate
sensitive files, which leveraged various techniques to gain deep access, steal
data, and disrupt operations.

 RansomHub installing AnyDesk.exe

A sophisticated ransomware leverages EDRKillShifter to evade security defenses
and deploys a binary that encrypts files and deletes VSS snapshots.

It uses a unique file extension based on the ransom note’s filename to identify
encrypted files. 



To counter this threat, organizations should strengthen endpoint protection,
implement driver- and kernel-level protections, enforce credential security,
enable behavioral monitoring, harden endpoint configurations, and stay updated
with the latest threat intelligence.

Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for
Free

 * Tags
 * EDRKillShifter
 * RansomHub Ransomware
 * Zerologon Vulnerability

Aman Mishra





LATEST ARTICLES

CVE/vulnerability


RCE VULNERABILITY (CVE-2024-30052) ALLOW ATTACKERS TO EXPLOIT VISUAL STUDIO VIA
DUMP FILES

The researcher investigated the potential security risks associated with
debugging dump files in Visual...
October 7, 2024
Cyber Security News


CACTI NETWORK MONITORING TOOL VULNERABILITY LET ATTACKERS EXECUTE REMOTE CODE

A critical security vulnerability has been identified in the Cacti network
monitoring tool that...
October 7, 2024
Cyber Security News


MICROSOFT & DOJ DISMANTLES HUNDREDS OF WEBSITES USED BY RUSSIAN HACKERS

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations
of Star...
October 7, 2024
Cyber Security News


CHINESE GROUP HACKED US COURT WIRETAP SYSTEMS

Chinese hackers have infiltrated the networks of major U.S. broadband providers,
gaining access to...
October 7, 2024



FREE WEBINAR


DECODING COMPLIANCE | WHAT CISOS NEED TO KNOW



Non-compliance can result in substantial financial penalties, with average fines
reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree
and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted
role of compliance in securing modern enterprises.

DISCUSSION POINTS

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance



Register Now



MORE LIKE THIS

CVE/vulnerability


RCE VULNERABILITY (CVE-2024-30052) ALLOW ATTACKERS TO EXPLOIT VISUAL STUDIO VIA
DUMP FILES

The researcher investigated the potential security risks associated with
debugging dump files in Visual...
October 7, 2024
Cyber Security News


CACTI NETWORK MONITORING TOOL VULNERABILITY LET ATTACKERS EXECUTE REMOTE CODE

A critical security vulnerability has been identified in the Cacti network
monitoring tool that...
October 7, 2024
Cyber Security News


MICROSOFT & DOJ DISMANTLES HUNDREDS OF WEBSITES USED BY RUSSIAN HACKERS

Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations
of Star...
October 7, 2024

gbhackers.

GBHackers on Security is a top cybersecurity news platform, delivering
up-to-date coverage on breaches, emerging threats, malware, vulnerabilities, and
global cyber incidents.

Company

 * Advertise
 * Vulnerability
 * Contact Us

Trending

Infosec- Resources


HOW TO ACCESS DARK WEB ANONYMOUSLY AND KNOW ITS SECRETIVE AND MYSTERIOUS
ACTIVITIES

SOC Architecture


HOW TO BUILD AND RUN A SECURITY OPERATIONS CENTER (SOC GUIDE) – 2023

Network Pentesting


NETWORK PENETRATION TESTING CHECKLIST – 2024

Categories

 * Infosec- Resources
 * SOC Resources
 * What is
 * Top 10

 * Advertise
 * Vulnerability
 * Contact Us

Copyright @ 20016 - 2024 GBHackers On Security - All Rights Reserved

Linkedin
RSS
Twitter