BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
BTC $58270.6324
ETH $3301.4664
BNB $400.6794
SOL $110.0515
XRP $0.5824
ADA $0.6271
AVAX $39.6830
DOGE $0.0970
TRX $0.1429
wstETH $3808.1443
DOT $8.3586
LINK $19.1334
WETH $3305.4834
MATIC $1.0428
UNI $11.0186
WBTC $57881.0446
IMX $3.3465
ICP $13.0316
BCH $301.2119
LTC $74.8427
CAKE $3.2026
ETC $28.3635
FIL $7.9610
LEO $4.4139
RNDR $7.4060
KAS $0.1700
HBAR $0.1136
DAI $1.0002
ATOM $11.3163
INJ $41.0291
VET $0.0502
TON $2.1419
OKB $51.8401
STX $3.2222
LDO $3.5190
FDUSD $0.9951
XMR $138.3902
XLM $0.1221
ARB $1.8935
NEAR $3.9358
TIA $16.9317
GRT $0.2829
WEMIX $2.2582
ENS $22.5313
MKR $2167.8555
APEX $2.4646
THETA $1.9298
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
  • Hackers Are Increasingly Finding Ways to Bypass Advanced Cybersecurity Tools

    Are even modern EDR solutions powerless against the sophisticated methods of cybercriminals?

    EDR software is universally recognized as a good way to protect your organization from destructive attacks from ransomware and other malicious software. As hacking has become more destructive and pervasive, powerful EDR tools from companies like CrowdStrike and Microsoft have been a boon to the cybersecurity industry.

    Endpoint detection and response software is designed to detect early signs of malicious activity on an organization's laptops, servers, and other devices—the so-called "endpoints" of a computer network. And, of course, these solutions are popular primarily for blocking such threats before attackers can steal data or block working machines.

    However, the researchers say that although the percentage of successful cyberattacks on computers with EDR installed is small, it is gradually growing. It seems that over time, hackers manage to invent more and more workarounds for some of the security technologies that have already become the gold standard for protecting critical systems.

    For example, over the past two years, Mandiant has investigated 84 violations that resulted in EDR or other endpoint security software being modified or disabled.

    “Hacking security controls is nothing new,” said Mark Kerfi, a cybersecurity expert.

    He also added that the prize, if successful, is access to all organizations and systems using similar security technologies, which further motivates hackers to look for loopholes.

    Microsoft revealed in a blog post in December how hackers tricked a company into applying its seal of authenticity to malware that was later used to disable EDR and other security tools. Microsoft suspended the accounts of third-party developers involved in the ploy and said the company is "working on long-term solutions to address these fraudulent activities and prevent future impacts on customers."

    And every cybersecurity company has a lot of such stories, because there is a whole variety of EDR solutions on the market and a “crowd of hackers” who continually “challenge” the system.

    A decade ago, the dominant vendors of security products for PCs and other endpoints were antivirus software vendors. However, their popularity has declined over time, as constant hacker attacks repeatedly exposed the weaknesses of the technology.

    The rise in ransomware and other destructive attacks has spurred demand for EDR and similar technologies designed to detect and block infections at an early stage. These tools track more signals of malicious activity and automate many of the time-consuming tasks of investigating and remediating violations.

    And since the situation is repeating now with EDR solutions, doesn’t it mean that in a few more years some more advanced security system will prevail in the corporate sector? Maybe, but so far, EDR remains the most advanced endpoint protection solution and does its job much better than simple antiviruses. You just need to remember that even such a seemingly reliable protection system is by no means a panacea.

    Persistent and stubborn hackers are unlikely to be stopped by at least one existing protection system, therefore, in addition to having an EDR, you need to have a competent CISO in your company who will quickly monitor the situation and make decisions that are not yet available to a regular program.

    Author DeepWeb
    Exploit in VM2 library allows a hacker to bypass Java protections
    Used corporate routers are the new gold for cybercriminals

    Comments 0

    Add comment