Thursday, September 11, 2025
HomeCyber SecurityRansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software program

RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software program


RansomHub ransomware abuses Kaspersky TDSSKiller to disable EDR software program

The RansomHub ransomware gang has been utilizing TDSSKiller, a authentic device from Kaspersky, to disable endpoint detection and response (EDR) companies on course programs.

After taking down the defenses, RansomHub deployed the LaZagne credential-harvesting device to extract logins from varied utility databases that would assist transfer laterally on the community.

TDSSKiller abused in ransomware assaults

Kaspersky created TDSSKiller as a device that may scan the system for the presence of rootkits and bootkits, two kinds of malware which might be significantly tough to detect and might evade commonplace safety instruments.

EDR brokers are extra superior options that function, at the least partially, on the kernel degree, as they should monitor and management low-level system actions similar to file entry, course of creation, and community connections, all offering real-time safety towards threats like ransomware.

Cybersecurity firm Malwarebytes studies that they not too long ago noticed RansomHub abusing TDSSKiller to work together with kernel-level companies utilizing a command line script or batch file that disabled the Malwarebytes Anti-Malware Service (MBAMService) working on the machine.

Commands supported by TDSSKiller
Command parameters supported by TDSSKiller
Supply: Malwarebytes

The authentic device was employed following the reconnaissance and privilege escalation section, and executed from a short lived listing (‘C:CustomersAppDataLocalTemp’) utilizing a dynamically generated filename (‘{89BCFDFB-BBAF-4631-9E8C-P98AB539AC}.exe’).

Being a authentic device signed with a sound certificates, TDSSKiller doesn’t danger RansomHub’s assault getting flagged or stopped by safety options.

Subsequent, RansomHub used the LaZagne device in an try and extract credentials saved in databases utilizing LaZagne. Within the assault that Malwarebytes investigated, the device generated 60 file writes that had been probably logs of the stolen credentials.

The motion to delete a file could possibly be the results of the attacker making an attempt to cowl their exercise on the system.

Defending towards TDSSKiller

Detecting LaZagne is simple as most safety instruments flag it as malicious. Nevertheless, its exercise can develop into invisible if TDSSKiller is used to deactivate the defenses.

TDSSKiller is in a grey space, as some safety instruments, together with Malwarebytes’ ThreatDown, label it as ‘RiskWare’, which may be a purple flag to customers.

The safety agency suggests activating the tamper safety function on the EDR resolution, to be sure that attackers cannot disable them with instruments like TDSSKiller.

Moreover, monitoring for the ‘-dcsvc’ flag, the parameter that disables or deletes companies, and for the execution of TDSSKiller itself can assist detect and block the malicious exercise.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments