The Dark Side of EDR: Repurpose EDR as an Offensive Tool

  Рет қаралды 3,260

Black Hat

Black Hat

Күн бұрын

As EDR solutions have become an integral part of the cybersecurity landscape, operating on millions of endpoints and servers, their role in advanced threat detection is undisputed. However, with great power comes great responsibility, an incorrect deployment can lead to critical vulnerabilities, potentially exploited by malicious actors.
This research explores a distinctive approach, differentiating itself from prior studies and real-world attacks that aimed at bypassing, disabling, or removing EDR systems, all of which tend to be conspicuous and impractical for Advanced Persistent Threat (APT) campaigns.
Our methodology involves control over the EDR, enabling the execution of code within its context. This capability allows us to operate secretly and persistently, significantly enhancing organizational security postures.
Focusing on Palo Alto Networks Cortex XDR, we demonstrate not only the manipulation of the system to bypass security measures but also the transformation of the EDR into a stealthy and uniquely persistent form of malware. Our research goes beyond the limitations of existing attacks, which are often too conspicuous for APT campaigns.
We successfully bypassed significant security features implemented by the Cortex XDR, including machine learning detection modules, evasion of behavioral modules, real-time prevention rules, and overcoming filter-driver protection against file modification.
The depth of our exploration encompasses exfiltration of sensitive user credentials, establishment of persistence on the targeted system, encryption of the entire machine (FUD), complete LSASS memory dumping, concealing malicious activity notifications, bypassing the XDR administrator password, and exploiting XDR comprehensively for malicious endeavors.
Notably, our persistence is so robust that it necessitates physical access to infected machines, as the XDR cannot be removed remotely from the management interface.
Join us as we delve into the implications of this novel attack vector, shedding light on the intricate relationship between attackers and XDR, and addressing a significant aspect of EDR security that has hitherto remained unexplored.
By:
Shmuel Cohen | Security Researcher, SafeBreach
Full Abstract:
www.blackhat.c...

Пікірлер
The Black Hat Asia Network Operations Center (NOC) Report
42:44
EDR Reloaded: Erase Data Remotely
40:18
Black Hat
Рет қаралды 2,7 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
Мясо вегана? 🧐 @Whatthefshow
01:01
История одного вокалиста
Рет қаралды 7 МЛН
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
Леон киллер и Оля Полякова 😹
00:42
Канал Смеха
Рет қаралды 4,7 МЛН
#HITB2022SIN EDR Evasion Primer For Red Teamers - Jorge Gimenez & Karsten Nohl
1:02:01
Hack In The Box Security Conference
Рет қаралды 15 М.
Digital Vengeance: Exploiting the Most Notorious C&C Toolkits
33:11
The Story Of The Dark Side Of The Moon
15:25
Pink Floyd
Рет қаралды 1 МЛН
Privacy Detective: Sniffing Out Your Data Leaks for Android
30:04
Practical LLM Security: Takeaways From a Year in the Trenches
37:01
Where People Go When They Want to Hack You
34:40
Cybernews
Рет қаралды 2,3 МЛН
What is DNS? (and how it makes the Internet work)
24:22
NetworkChuck
Рет қаралды 288 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН