Loading...
Loading...
Browse all stories on DeepNewz
VisitPrimary method of SYSTEM-level code execution by SideWinder APT by June 2025?
Exploiting EDRSilencer • 25%
Phishing attacks • 25%
Zero-day vulnerabilities • 25%
Other • 25%
Cybersecurity analysis reports detailing attack methods
SideWinder APT Exploits EDRSilencer Tool for SYSTEM Level Code Execution in Recent Attacks
Oct 16, 2024, 02:50 PM
Recent investigations have revealed that cybercriminals are exploiting the open-source tool EDRSilencer to compromise Endpoint Detection and Response (EDR) solutions. This tool, originally designed for red team operations, has been manipulated by threat actors to evade detection and conceal malicious activities. Researchers noted that the SideWinder Advanced Persistent Threat (APT) group is among those utilizing EDRSilencer in their latest attacks, which appear to have a broad geographic impact. The analysis indicates that these hackers are leveraging a recent software vulnerability to achieve SYSTEM-level code execution, thereby enhancing their capabilities for remote monitoring and management of compromised systems.
View original story
Phishing • 25%
Malware • 25%
Ransomware • 25%
Other • 25%
Software patch from Avast • 25%
Antivirus updates from other vendors • 25%
System restore or reinstallation • 25%
Other methods • 25%
Kernel Rootkit • 25%
SSDT Hook • 25%
Infinityhook • 25%
Other • 25%
Phishing emails • 25%
Malware • 25%
Social engineering • 25%
Other • 25%
Phishing • 25%
Zero-day exploits • 25%
Malware • 25%
Other • 25%
Phishing • 25%
Direct network attack • 25%
Malware installation • 25%
Other • 25%
Phishing attacks • 25%
Direct server exploitation • 25%
Malware distribution • 25%
Other • 25%
Phishing • 25%
Malware • 25%
DDoS • 25%
Exploiting Vulnerabilities • 25%
Ransomware • 25%
Data theft • 25%
Denial of Service • 25%
Other • 25%
Router vulnerabilities • 25%
Camera vulnerabilities • 25%
Other internet-connected devices • 25%
Unknown/Multiple methods • 25%
CXCLNT • 25%
CLNTEND • 25%
New custom malware • 25%
Other known malware • 25%
Nearest Neighbor Attack • 25%
Phishing • 25%
Malware • 25%
Other • 25%
Other • 25%
Symantec • 25%
McAfee • 25%
Kaspersky • 25%