gbhackers.com
Open in
urlscan Pro
172.233.149.136
Public Scan
Submitted URL: https://t.co/1QBGigO9F5
Effective URL: https://gbhackers.com/ransomhub-ransomware-edr-bypass/
Submission: On October 07 via api from IN — Scanned from CA
Effective URL: https://gbhackers.com/ransomhub-ransomware-edr-bypass/
Submission: On October 07 via api from IN — Scanned from CA
Form analysis
1 forms found in the DOMGET https://gbhackers.com/
<form method="get" class="tdb-search-form" action="https://gbhackers.com/">
<div class="tdb-search-form-inner"><input class="tdb-head-search-form-input" placeholder=" " type="text" value="" name="s" autocomplete="off"><button class="wpb_button wpb_btn-inverse btn tdb-head-search-form-btn" title="Search"
type="submit"><span> Search</span></button></div>
</form>
Text Content
gbhackers. Monday, October 7, 2024 Facebook Instagram Twitter gbhackers. * Home * Threats * Cyber Attack * Data Breach * Vulnerability * What is * DFIR * Top 10 Search Follow us On Linkedin HomeCVE/vulnerabilityRansomHub Ransomware Using Multiple Techniques To Disable EDR And Antivirus RANSOMHUB RANSOMWARE USING MULTIPLE TECHNIQUES TO DISABLE EDR AND ANTIVIRUS CVE/vulnerabilityCyber Security NewsRansomware Published on September 26, 2024 By Aman Mishra DECODING COMPLIANCE WITH CISOS The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain unauthorized access to networks, affecting various industries and critical infrastructure sectors, demanding ransom payments for data release. The group’s recent integration of EDRKillShifter, a tool designed to evade detection and disrupt security processes, poses a significant threat to endpoint security, whose ability to dynamically disable EDR solutions and ensure persistence makes it a formidable adversary for traditional security measures. The infection chain of the RansomHub utilizing EDRKillShifter A ransomware group typically gains initial access to systems by exploiting vulnerabilities, phishing, or password spraying. A compromised user account was the primary entry point in a specific incident, with multiple spear phishing attempts detected. - Advertisement - Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration The Zerologon vulnerability was identified as a potential access vector, as the Vision One telemetry dataset revealed detections indicating the abuse of elevation control mechanisms, further suggesting the presence of malicious activity. 232.bat performing brute force RansomHub’s evasion tactics employed four batch scripts to disable security measures and facilitate unauthorized access, as 232.bat used password spraying and disabled Windows Defender. Tdsskiller.bat modified the registry, terminated processes, and disabled Trend Micro’s antivirus service, and Killdeff.bat, an obfuscated PowerShell script, manipulated Windows Defender settings and attempted privilege escalation. LogDel.bat altered file attributes, modified RDP settings, and cleared Windows Event Logs to hinder forensic analysis, which compromised system security and enabled RansomHub to execute its malicious payload. The command used to remove system and hidden attributes of Default.rdp via Attrib.exe The EDRKillShifter tool, a BYOVD loader, uses a password-protected command line to execute and decrypt an embedded resource named “data.bin,” and then unpacks and executes a second-stage payload, which further decrypts the final payload containing the Gobinary and a vulnerable driver. The loader deploys and exploits the vulnerable driver to gain elevated privileges. This allows it to terminate specific antivirus applications listed in an IoC text file by creating a Windows service named KB20240815 to persist on the system. EDRKillShifter dropping the vulnerable driver RansomHub employed a multi-stage attack, starting with credential theft using Taskmgr.exe to dump LSASS memory and then conducting covert network reconnaissance with NetScan, laterally moving using SMB/Windows Admin Shares. AnyDesk served as their C&C infrastructure, while rclone was used to exfiltrate sensitive files, which leveraged various techniques to gain deep access, steal data, and disrupt operations. RansomHub installing AnyDesk.exe A sophisticated ransomware leverages EDRKillShifter to evade security defenses and deploys a binary that encrypts files and deletes VSS snapshots. It uses a unique file extension based on the ransom note’s filename to identify encrypted files. To counter this threat, organizations should strengthen endpoint protection, implement driver- and kernel-level protections, enforce credential security, enable behavioral monitoring, harden endpoint configurations, and stay updated with the latest threat intelligence. Analyse AnySuspicious Links Using ANY.RUN's New Safe Browsing Tool: Try It for Free * Tags * EDRKillShifter * RansomHub Ransomware * Zerologon Vulnerability Aman Mishra LATEST ARTICLES CVE/vulnerability RCE VULNERABILITY (CVE-2024-30052) ALLOW ATTACKERS TO EXPLOIT VISUAL STUDIO VIA DUMP FILES The researcher investigated the potential security risks associated with debugging dump files in Visual... October 7, 2024 Cyber Security News CACTI NETWORK MONITORING TOOL VULNERABILITY LET ATTACKERS EXECUTE REMOTE CODE A critical security vulnerability has been identified in the Cacti network monitoring tool that... October 7, 2024 Cyber Security News MICROSOFT & DOJ DISMANTLES HUNDREDS OF WEBSITES USED BY RUSSIAN HACKERS Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star... October 7, 2024 Cyber Security News CHINESE GROUP HACKED US COURT WIRETAP SYSTEMS Chinese hackers have infiltrated the networks of major U.S. broadband providers, gaining access to... October 7, 2024 FREE WEBINAR DECODING COMPLIANCE | WHAT CISOS NEED TO KNOW Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone. Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises. DISCUSSION POINTS The Role of Compliance The Alphabet Soup of Compliance Compliance SaaS and Compliance Indusface's Approach to Compliance Register Now MORE LIKE THIS CVE/vulnerability RCE VULNERABILITY (CVE-2024-30052) ALLOW ATTACKERS TO EXPLOIT VISUAL STUDIO VIA DUMP FILES The researcher investigated the potential security risks associated with debugging dump files in Visual... October 7, 2024 Cyber Security News CACTI NETWORK MONITORING TOOL VULNERABILITY LET ATTACKERS EXECUTE REMOTE CODE A critical security vulnerability has been identified in the Cacti network monitoring tool that... October 7, 2024 Cyber Security News MICROSOFT & DOJ DISMANTLES HUNDREDS OF WEBSITES USED BY RUSSIAN HACKERS Microsoft and the U.S. Department of Justice (DOJ) have disrupted the operations of Star... October 7, 2024 gbhackers. GBHackers on Security is a top cybersecurity news platform, delivering up-to-date coverage on breaches, emerging threats, malware, vulnerabilities, and global cyber incidents. Company * Advertise * Vulnerability * Contact Us Trending Infosec- Resources HOW TO ACCESS DARK WEB ANONYMOUSLY AND KNOW ITS SECRETIVE AND MYSTERIOUS ACTIVITIES SOC Architecture HOW TO BUILD AND RUN A SECURITY OPERATIONS CENTER (SOC GUIDE) – 2023 Network Pentesting NETWORK PENETRATION TESTING CHECKLIST – 2024 Categories * Infosec- Resources * SOC Resources * What is * Top 10 * Advertise * Vulnerability * Contact Us Copyright @ 20016 - 2024 GBHackers On Security - All Rights Reserved Linkedin RSS Twitter