AI
AI

Attackers Modify EDRSilencer to Bypass Detection Systems

Photo credit: www.csoonline.com

Understanding WFP and EDRSilencer: An Overview of Network Packet Processing and Security Tools

The Windows Filtering Platform (WFP) comprises a collection of Windows APIs and services that allow developers to engage directly with the intricacies of network packet processing in the Windows networking architecture. This robust framework empowers various security applications, including firewalls, to monitor, modify, or even prevent network packets from transmitting based on criteria such as IP addresses, ports, and the processes initiating the communication.

EDRSilencer: Targeting EDR Processes

One application that effectively utilizes WFP is EDRSilencer, which is designed to create filters targeting processes linked to widely used Endpoint Detection and Response (EDR) tools. EDRSilencer supports an array of agents by default, including well-known solutions like Microsoft Defender for Endpoint, Elastic EDR, and Carbon Black EDR, among others. This capability allows users to enhance their security measures by restricting network communications from these EDR programs.

Supported EDR Tools

The list of supported EDR agents by EDRSilencer is extensive. Agents typically include:

  • Microsoft Defender for Endpoint
  • Microsoft Defender Antivirus
  • Elastic EDR
  • Trellix EDR
  • Qualys EDR
  • SentinelOne
  • Cylance
  • Cybereason
  • Carbon Black EDR
  • Carbon Black Cloud
  • Tanium
  • Palo Alto Networks Traps/Cortex XDR
  • FortiEDR
  • Cisco Secure Endpoint (formerly Cisco AMP)
  • ESET Inspect
  • Harfanglab EDR
  • TrendMicro Apex One

Flexibility in Blocking Other Processes

In instances where an EDR agent is installed that is not included in the supported list, EDRSilencer provides flexibility. Users can manually specify the full path to any process they wish to block from network communication. This functionality allows the tool to potentially restrict network traffic for a wide variety of applications, not limited solely to EDR software, thereby broadening its utility for users seeking enhanced network security.

By leveraging WFP and tools like EDRSilencer, organizations can implement a more granular approach to network security, significantly fortifying their defenses against unwanted communications and potential threats.

Source
www.csoonline.com

Related by category

Google Warns of Increasing Enterprise-Specific Zero-Day Exploits

Photo credit: www.csoonline.com The Evolving Landscape of Mobile Security Vulnerabilities Recent...

Cybersecurity Leaders Condemn ‘Political Persecution’ of Chris Krebs in Letter to the President

Photo credit: www.csoonline.com In November 2018, President Trump appointed Chris...

Broadcom-Supported SAN Devices Vulnerable to Code Injection Attacks Due to Critical Fabric OS Flaw

Photo credit: www.csoonline.com Critical Vulnerability Found in Broadcom’s Brocade Fabric...

Latest news

Kolkata Hotel Fire Claims at Least 14 Lives, According to Police

Photo credit: www.cbsnews.com New Delhi — A devastating fire engulfed...

Raphinha Transforms from Unsung Hero to Ballon d’Or Contender for Barcelona

Photo credit: www.theguardian.com Raphinha: A Journey Through Missed Opportunities and...

An Existential Moment: Greens Challenge Reform for Disenchanted Voters

Photo credit: www.theguardian.com With its picturesque thatched cottages and rural...

Breaking news