Loading...
Loading...
Browse all stories on DeepNewz
VisitSideWinder APT Exploits EDRSilencer Tool for SYSTEM Level Code Execution in Recent Attacks
Oct 16, 2024, 02:50 PM
Recent investigations have revealed that cybercriminals are exploiting the open-source tool EDRSilencer to compromise Endpoint Detection and Response (EDR) solutions. This tool, originally designed for red team operations, has been manipulated by threat actors to evade detection and conceal malicious activities. Researchers noted that the SideWinder Advanced Persistent Threat (APT) group is among those utilizing EDRSilencer in their latest attacks, which appear to have a broad geographic impact. The analysis indicates that these hackers are leveraging a recent software vulnerability to achieve SYSTEM-level code execution, thereby enhancing their capabilities for remote monitoring and management of compromised systems.
View original story
Markets
No • 50%
Yes • 50%
Official announcements from major cybersecurity firms like Symantec, McAfee, or Kaspersky
Yes • 50%
No • 50%
Availability status of EDRSilencer on platforms such as GitHub
No • 50%
Yes • 50%
Publicly available cybersecurity reports or government press releases
Other • 25%
Symantec • 25%
McAfee • 25%
Kaspersky • 25%
Official publications or press releases from cybersecurity companies
Other • 25%
North America • 25%
Europe • 25%
Asia • 25%
Cybersecurity reports from organizations like FireEye or CrowdStrike detailing geographic impact
Exploiting EDRSilencer • 25%
Phishing attacks • 25%
Zero-day vulnerabilities • 25%
Other • 25%
Cybersecurity analysis reports detailing attack methods