Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New “bring your own installer” EDR bypass used in ransomware attack
    Security

    New “bring your own installer” EDR bypass used in ransomware attack

    PineapplesUpdateBy PineapplesUpdateMay 6, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New “bring your own installer” EDR bypass used in ransomware attack
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New “bring your own installer” EDR bypass used in ransomware attack

    A new “Lao Your on Installer” EDR bypass technology is used in attacks to bypass the tampering conservation facility of the watchdog, allowing the danger actors to disable the endpoint detection and response (EDR) agents to establish Babuk Rancemware.

    This technique takes advantage of a difference in the agent upgrade process that allows danger actors to run EDR agents, making the equipment unsafe.

    The attack discovered this attack during the engagement with a customer by John Isals and AON’s Strose Freedberg event response team, which was facing ransomware attack earlier this year.

    Technology does not rely on third-party tools or drivers such as we normally see with the EDR bypass, but rather misuse the Sentinelon installer instead.

    Sentinelon recommends customers to enable the “online authority” setting, which is closed by default, to reduce this attack.

    “We want to ensure that the term exit to ensure that the customers of Sentinelon have to enable local upgrade safety,” John Alex, AON’s Stroz Freedberg DFIR told BlappingComotar.

    “We have examined the atmosphere with Sentinelon as their guidance was sent to customers and has seen customers who still do not enable it. At the end of the day, obtaining words to reduce this bypass is the most important thing.”

    Actively exploited in ransomware attacks

    Researchers from Stroz Freedberg say that Sentinalon saves its EDR agent with an anti-tamper safety facility, which requires a manual action in the Sentinelon management console or a unique code to remove an agent.

    However, like many other software installers, the Sentinelon installer eliminates any affiliated windows processes just before the existing files are adopted with the new version when installing a separate version of the agent.

    The danger actors found that they could take advantage of this small window of the opportunity by running a legitimate sentinel installer and then after shutting down the services of the running agent, they could fiercely eliminate the installed process, which makes the equipment unsafe.

    Bring your own installer EDR bypass attack chain
    Bring your own installer EDR bypass attack chain
    Source: Strose Freedberg

    Earlier this year, Stroz Freedberg was engaged to check an attack on a customer’s network, showing that the attackers had administrative access to the customer’s network through a vulnerability.

    The attackers then used this new bypass by abolishing the Sentinelon Windows Installer (“” “msiexec.exe“) The process before installing and launching the new version of the agent. With disabled security on the device, the danger actors were then able to deploy ransomware.

    In a conversation with Bleepingcomputer, AILES stated that the danger actors can use new or old versions of the agent to conduct this attack, so even though the latest versions run on equipment, they are still unsafe.

    “Stroz Freedberg also noticed that the Sentinelon management went offline in the Console, shortly after finishing the host installer. Stroz Freedberg’s report,

    “Further testing revealed that the attack was successful in several versions of the Sentinelon agent and did not depend on the specific versions seen in the event.”

    Strose Freedberg expressed the attack responsibly for Sentinelon, who in January 2025 worked with customers privately.

    The mitigation is to enable the “online authority” facility in the Sentry Sentinel Settings, which when enabled, requires the approval from the Sentinelon management console before the local upgrade, downgrade, or uninstall of the agent.

    Sentinelon also shared the advice of Stroz Freedberg on this new technique with all other major EDR vendors on this new technology, if they were also affected.

    The Palo Alto Network confirmed Strose Freedberg that the attack did not affect its EDR software.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    Attack bring bypass EDR installer Ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI have tested every major AI Chatbot in 2025 – these 5 signs never fail me
    Next Article IBM introduces a mainframe to AI: Linuxon Emperor 5
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    Your Bluetooth headphones may be under attack – here’s what to do next

    January 15, 2026
    Startups

    How I use AI to bring my kid’s art to life – and why it’s a fun learning opportunity

    December 13, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.