Patrik S.’s Post

View profile for Patrik S., graphic

Teacher/Educator IT/IT-Security

https://lnkd.in/dWtiuiyA "When it first executes, GhostEngine scans machines for any EDR, or endpoint protection and response, software that may be running. If it finds any, it loads drivers known to contain vulnerabilities that allow attackers to gain access to the kernel, the core of all operating systems that’s heavily restricted to prevent tampering. One of the vulnerable drivers is an anti-rootkit file from Avast named aswArPots.sys. GhostEngine uses it to terminate the EDR security agent. A malicious file named smartscreen.exe then uses a driver from IObit named iobitunlockers.sys to delete the security agent binary." "The infection chain starts with the execution of a malicious binary that masquerades as the legitimate Windows file TiWorker.exe. That file runs a PowerShell script that retrieves an obfuscated script, titled get.png, which downloads additional tools, modules, and configurations from an attacker-controlled server." #malware #ghostengine #xmrig #cryptojacking #endpoints #edr

Researchers spot cryptojacking attack that disables endpoint protections

Researchers spot cryptojacking attack that disables endpoint protections

arstechnica.com

To view or add a comment, sign in

Explore topics