Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

How Brex is catching up to AI by embracing “confusion”

Adaptive Reuse Creates Homes in Suburban Texas Strip Malls

Investigation: Anti-homelessness laws don’t work

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers reuse and attack the Ransom Hub edrkillshifter in Medusa, Baian
Identity

Hackers reuse and attack the Ransom Hub edrkillshifter in Medusa, Baian

userBy userMarch 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 27, 2025Ravi LakshmananEndpoint Security/Ransomware

EdrkillShifter on Ransomhub

The new analysis reveals connections between Ransomhub affiliates and other ransomware groups such as Medusa, Bianlian and Play.

According to ESET, the connection is attributed to the use of custom tools designed to disable endpoint detection and response (EDR) software on compromised hosts. The EDR Killing Tool, known as Edrkillshifter, was first documented as used by Ransomhub actors in August 2024.

EdrkillShifter achieves its goals through a known tactic called Bring Your Own’s own Vulnerable Driver (BYOVD), which includes using legal but vulnerable drivers to terminate security solutions that protect endpoints.

Cybersecurity

The idea of ​​using such a tool is to ensure smooth execution of ransomware cryptographic devices without flagging them with security solutions.

“During the intrusion, the goal of affiliate marketing is to obtain admin or domain management privileges,” ESET researchers Jakub Souček and Jan Holman said in a report shared with Hacker News.

“Ransomware operators tend not to make large-scale updates of crypto companies as they introduce flaws that can cause problems and ultimately damage their reputation. As a result, security vendors detect crypto companies very well.

EdrkillShifter on Ransomhub

What is noteworthy here is that the bespoke tool developed by Ransomhub operators and provided to its affiliates – a rare phenomenon in itself – is used in other ransomware attacks related to Medusa, Bianlian and Play.

This aspect assumes special importance in light of the fact that both Play and Bian operate under a closed RAAS model. Their partnership is based on long-term mutual trust, as operators are not actively looking to hire new affiliates.

“The trusted members of Play and Bianlian have even worked together with newly emerging rivals like Ransomhub, and have since reused the tools they received from those rivals in their own attacks,” ESET theorized. “This is particularly interesting as these closed gangs usually employ a fairly consistent set of core tools during intrusions.”

All of these ransomware attacks are suspected to have been carried out by the same threat actor called Quadswitchers. Quad Switcher may be related to the closest play due to the similarity of the trademarks that are usually associated with play intrusions.

It has also been observed that EdrkillShifter is being used by another individual ransomware affiliate known as CosmicBeetle as part of three different Ransomhub and fake Lockbit attacks.

Cybersecurity

This development uses the BYOVD technique to deploy EDR killers to compromised systems amid a surge in ransomware attacks. Last year, ransomware gangs known as embargoes were discovered to neutralize security software using a program called MS4Killer. As this month, the Medusa ransomware crew is linked to a malicious driver called CodeNead Abyssworker.

“Threat actors need administrator privileges to deploy EDR killers, so ideally they should detect and mitigate their presence before reaching that point,” ESET said.

“Users, especially in corporate environments, should ensure that detection of potentially insecure applications is enabled, which will prevent the installation of vulnerable drivers.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleForgotten Playland: Beam’s flagship titles will be released on the Epic Games store: the ultimate multiplayer party game
Next Article Everything you need to know about the AI chatbot
user
  • Website

Related Posts

Taiwan NSB warns the public about the risks of data reintroducing Tiktok, Waibo and Chinese ties

July 5, 2025

The exposed JDWP interface leads to crypto mining, and Hpingbot targets DDO’s SSH

July 5, 2025

TwinH: A New Frontier in the Pursuit of Immortality?

July 4, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

How Brex is catching up to AI by embracing “confusion”

Adaptive Reuse Creates Homes in Suburban Texas Strip Malls

Investigation: Anti-homelessness laws don’t work

In the US, urban gondolas face uphill battles

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

TwinH: A New Frontier in the Pursuit of Immortality?

Meta’s Secret Weapon: The Superintelligence Unit That Could Change Everything 

Unlocking the Power of Prediction: The Rise of Digital Twins in the IoT World

TwinH: Digital Human Twin Aims for Victory at Break the Gap 2025

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.