Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

At least three people have been killed as Syrian troops attack ISIL’s hideout in Aleppo | Political News

Laser-driven fusion experiments will more than double its power

FA Cup Final 2025: Crystal Palace defeats Man City with a massive upset | Football News

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Hackers reuse and attack the Ransom Hub edrkillshifter in Medusa, Baian
Identity

Hackers reuse and attack the Ransom Hub edrkillshifter in Medusa, Baian

userBy userMarch 27, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

March 27, 2025Ravi LakshmananEndpoint Security/Ransomware

EdrkillShifter on Ransomhub

The new analysis reveals connections between Ransomhub affiliates and other ransomware groups such as Medusa, Bianlian and Play.

According to ESET, the connection is attributed to the use of custom tools designed to disable endpoint detection and response (EDR) software on compromised hosts. The EDR Killing Tool, known as Edrkillshifter, was first documented as used by Ransomhub actors in August 2024.

EdrkillShifter achieves its goals through a known tactic called Bring Your Own’s own Vulnerable Driver (BYOVD), which includes using legal but vulnerable drivers to terminate security solutions that protect endpoints.

Cybersecurity

The idea of ​​using such a tool is to ensure smooth execution of ransomware cryptographic devices without flagging them with security solutions.

“During the intrusion, the goal of affiliate marketing is to obtain admin or domain management privileges,” ESET researchers Jakub Souček and Jan Holman said in a report shared with Hacker News.

“Ransomware operators tend not to make large-scale updates of crypto companies as they introduce flaws that can cause problems and ultimately damage their reputation. As a result, security vendors detect crypto companies very well.

EdrkillShifter on Ransomhub

What is noteworthy here is that the bespoke tool developed by Ransomhub operators and provided to its affiliates – a rare phenomenon in itself – is used in other ransomware attacks related to Medusa, Bianlian and Play.

This aspect assumes special importance in light of the fact that both Play and Bian operate under a closed RAAS model. Their partnership is based on long-term mutual trust, as operators are not actively looking to hire new affiliates.

“The trusted members of Play and Bianlian have even worked together with newly emerging rivals like Ransomhub, and have since reused the tools they received from those rivals in their own attacks,” ESET theorized. “This is particularly interesting as these closed gangs usually employ a fairly consistent set of core tools during intrusions.”

All of these ransomware attacks are suspected to have been carried out by the same threat actor called Quadswitchers. Quad Switcher may be related to the closest play due to the similarity of the trademarks that are usually associated with play intrusions.

It has also been observed that EdrkillShifter is being used by another individual ransomware affiliate known as CosmicBeetle as part of three different Ransomhub and fake Lockbit attacks.

Cybersecurity

This development uses the BYOVD technique to deploy EDR killers to compromised systems amid a surge in ransomware attacks. Last year, ransomware gangs known as embargoes were discovered to neutralize security software using a program called MS4Killer. As this month, the Medusa ransomware crew is linked to a malicious driver called CodeNead Abyssworker.

“Threat actors need administrator privileges to deploy EDR killers, so ideally they should detect and mitigate their presence before reaching that point,” ESET said.

“Users, especially in corporate environments, should ensure that detection of potentially insecure applications is enabled, which will prevent the installation of vulnerable drivers.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleForgotten Playland: Beam’s flagship titles will be released on the Epic Games store: the ultimate multiplayer party game
Next Article Everything you need to know about the AI chatbot
user
  • Website

Related Posts

New HTTPBOT BOTNET launches over 200 precision DDOS attacks against gaming and high-tech sectors

May 16, 2025

Top 10 Best Practices for Effective Data Protection

May 16, 2025

Researchers reveal flaws in new Intel CPUs that allow memory leaks and Specter V2 attacks

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

At least three people have been killed as Syrian troops attack ISIL’s hideout in Aleppo | Political News

Laser-driven fusion experiments will more than double its power

FA Cup Final 2025: Crystal Palace defeats Man City with a massive upset | Football News

Revolutionizing Sports with AI: A Game Changer for Industry Professionals

Trending Posts

At least three people have been killed as Syrian troops attack ISIL’s hideout in Aleppo | Political News

May 17, 2025

FA Cup Final 2025: Crystal Palace defeats Man City with a massive upset | Football News

May 17, 2025

Hamas says the story will be ongoing as Israel expands its ground attacks | Israeli-Palestinian conflict news

May 17, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Revolutionizing Sports with AI: A Game Changer for Industry Professionals

AI bias and manipulation: Grok admits that the creators were instructed to frame “white genocide” as fact until South African courts forced a U-turn.

How to start a business in the age of AI (and now is the best time)

Openai launches Codex: a cloud agent for software engineers who write code, fix bugs, and handle tasks in parallel

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.