Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    5 to avoid pressure washing mistakes

    June 8, 2025

    Spain vs Portugal Live Stream: How to see the Rashtra League Final 2025 from anywhere and for free

    June 8, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»New “bring your own installer” EDR bypass used in ransomware attack
    Security

    New “bring your own installer” EDR bypass used in ransomware attack

    PineapplesUpdateBy PineapplesUpdateMay 6, 2025No Comments4 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    New “bring your own installer” EDR bypass used in ransomware attack
    Share
    Facebook Twitter LinkedIn Pinterest Email

    New “bring your own installer” EDR bypass used in ransomware attack

    A new “Lao Your on Installer” EDR bypass technology is used in attacks to bypass the tampering conservation facility of the watchdog, allowing the danger actors to disable the endpoint detection and response (EDR) agents to establish Babuk Rancemware.

    This technique takes advantage of a difference in the agent upgrade process that allows danger actors to run EDR agents, making the equipment unsafe.

    The attack discovered this attack during the engagement with a customer by John Isals and AON’s Strose Freedberg event response team, which was facing ransomware attack earlier this year.

    Technology does not rely on third-party tools or drivers such as we normally see with the EDR bypass, but rather misuse the Sentinelon installer instead.

    Sentinelon recommends customers to enable the “online authority” setting, which is closed by default, to reduce this attack.

    “We want to ensure that the term exit to ensure that the customers of Sentinelon have to enable local upgrade safety,” John Alex, AON’s Stroz Freedberg DFIR told BlappingComotar.

    “We have examined the atmosphere with Sentinelon as their guidance was sent to customers and has seen customers who still do not enable it. At the end of the day, obtaining words to reduce this bypass is the most important thing.”

    Actively exploited in ransomware attacks

    Researchers from Stroz Freedberg say that Sentinalon saves its EDR agent with an anti-tamper safety facility, which requires a manual action in the Sentinelon management console or a unique code to remove an agent.

    However, like many other software installers, the Sentinelon installer eliminates any affiliated windows processes just before the existing files are adopted with the new version when installing a separate version of the agent.

    The danger actors found that they could take advantage of this small window of the opportunity by running a legitimate sentinel installer and then after shutting down the services of the running agent, they could fiercely eliminate the installed process, which makes the equipment unsafe.

    Bring your own installer EDR bypass attack chain
    Bring your own installer EDR bypass attack chain
    Source: Strose Freedberg

    Earlier this year, Stroz Freedberg was engaged to check an attack on a customer’s network, showing that the attackers had administrative access to the customer’s network through a vulnerability.

    The attackers then used this new bypass by abolishing the Sentinelon Windows Installer (“” “msiexec.exe“) The process before installing and launching the new version of the agent. With disabled security on the device, the danger actors were then able to deploy ransomware.

    In a conversation with Bleepingcomputer, AILES stated that the danger actors can use new or old versions of the agent to conduct this attack, so even though the latest versions run on equipment, they are still unsafe.

    “Stroz Freedberg also noticed that the Sentinelon management went offline in the Console, shortly after finishing the host installer. Stroz Freedberg’s report,

    “Further testing revealed that the attack was successful in several versions of the Sentinelon agent and did not depend on the specific versions seen in the event.”

    Strose Freedberg expressed the attack responsibly for Sentinelon, who in January 2025 worked with customers privately.

    The mitigation is to enable the “online authority” facility in the Sentry Sentinel Settings, which when enabled, requires the approval from the Sentinelon management console before the local upgrade, downgrade, or uninstall of the agent.

    Sentinelon also shared the advice of Stroz Freedberg on this new technique with all other major EDR vendors on this new technology, if they were also affected.

    The Palo Alto Network confirmed Strose Freedberg that the attack did not affect its EDR software.


    Red Report 2025

    Based on the analysis of 14M malicious tasks, search for the top 10 MITERAT & CK techniques behind the 93% attacks and how to defend them against them.

    Attack bring bypass EDR installer Ransomware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleI have tested every major AI Chatbot in 2025 – these 5 signs never fail me
    Next Article IBM introduces a mainframe to AI: Linuxon Emperor 5
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Remove project directors presented as malicious NPM package utilities

    June 8, 2025
    Security

    Supply series attacks Glustac NPM package with 960K weekly download

    June 7, 2025
    Security

    Exploitation of Critical Round Cube webmail as hacker taking intly

    June 7, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025594 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025536 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025465 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    Meta delay entrusts ‘Bhamoth’ AI model, Openi and Google more than one more head start

    May 16, 20250 Views

    The OURA ring found a new rival with just one titanium design and 24/7 biometric tracking – no membership is required

    May 16, 20250 Views

    Filecoin, Lockheed Martin Test IPFS in space

    May 16, 20250 Views
    Our Picks

    What is MicroSD Express? Everything You Need To Know

    June 8, 2025

    5 to avoid pressure washing mistakes

    June 8, 2025

    Spain vs Portugal Live Stream: How to see the Rashtra League Final 2025 from anywhere and for free

    June 8, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.