{"id":3101,"date":"2023-06-02T15:28:22","date_gmt":"2023-06-02T22:28:22","guid":{"rendered":"https:\/\/krsp.co\/agency\/?p=3101"},"modified":"2023-06-08T11:35:03","modified_gmt":"2023-06-08T18:35:03","slug":"hacker-claims-new-tool-can-bypass-any-antivirus-edr","status":"publish","type":"post","link":"https:\/\/krsp.co\/agency\/2023\/06\/hacker-claims-new-tool-can-bypass-any-antivirus-edr\/","title":{"rendered":"Malicious Actor Claims New Tool Can Bypass Any Antivirus, EDR"},"content":{"rendered":"\n<p>A malicious actor is selling a tool called Terminator that they claim can bypass antivirus and EDR software. The tool is reportedly able to bypass 24 different security solutions, including Windows Defender, on devices running Windows 7 and later.<\/p>\n\n\n\n<p>The author of Terminator, who goes by the pseudonym &#8220;Spyboy,&#8221; sells the tool for prices ranging from $300 for a single bypass to $3,000 for an all-in-one bypass.<\/p>\n\n\n\n<p>In order to use Terminator, clients require <a href=\"https:\/\/www.thetechedvocate.org\/what-are-administrative-privileges\/\" target=\"_blank\" rel=\"noreferrer noopener\">administrative privileges<\/a> on the target Windows systems. This can be done by tricking the user into accepting the Windows User Account Control (UAC) pop-up that will be displayed when the tool is launched.<\/p>\n\n\n\n<p>A <a rel=\"noreferrer noopener\" href=\"https:\/\/www.reddit.com\/r\/crowdstrike\/comments\/13wjrgn\/20230531_situational_awareness_spyboy_defense\/\" target=\"_blank\">CrowdStrike engineer<\/a> found that Terminator is actually a simple tool that dumps a legitimate signed Zemana antivirus driver into the target system. The driver is then loaded to obtain elevated privileges in order to terminate the processes of antivirus, EDR and XDR programs running on the device.<\/p>\n\n\n\n<p>Currently, only one<a href=\"https:\/\/www.virustotal.com\/gui\/file\/543991ca8d1c65113dff039b85ae3f9a87f503daec30f46929fd454bc57e5a91\"> VirusTotal<\/a> scan engine detects this driver as malicious. <\/p>\n\n\n\n<p>Twitter user <a rel=\"noreferrer noopener\" href=\"https:\/\/twitter.com\/S0ufi4n3\/status\/1663059373352943616\" target=\"_blank\">S0ufi4n3<\/a> shared links to the videos supposedly showing Terminator in action<br><a rel=\"noreferrer noopener\" href=\"https:\/\/streamable.com\/h9n16x\" target=\"_blank\">https:\/\/streamable.com\/h9n16x<\/a><br><a rel=\"noreferrer noopener\" href=\"https:\/\/streamable.com\/ys07we\" target=\"_blank\">https:\/\/streamable.com\/ys07we<\/a><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Here are some additional tips for protecting your system from Terminator and other malware threats:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Keep your operating system and software up to date with the latest security patches.<\/li>\n\n\n\n<li>Use a reputable antivirus program and keep it up to date with the latest virus definitions.<\/li>\n\n\n\n<li>Be careful about what websites you visit and what files you download.<\/li>\n\n\n\n<li>Do not open email attachments from unknown senders.<\/li>\n\n\n\n<li>Use a firewall to protect your computer from unauthorized access.<\/li>\n\n\n\n<li>Be aware of the latest malware threats and how to protect yourself.<\/li>\n<\/ul>\n\n\n\n<p>Source: <a href=\"https:\/\/gridinsoft.com\/blogs\/terminator-and-antivirus-programs\/\">https:\/\/gridinsoft.com\/blogs\/terminator-and-<\/a><a href=\"https:\/\/gridinsoft.com\/blogs\/terminator-and-antivirus-programs\/\" target=\"_blank\" rel=\"noreferrer noopener\">antivirus<\/a><a href=\"https:\/\/gridinsoft.com\/blogs\/terminator-and-antivirus-programs\/\">-programs\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A malicious actor is selling a tool called Terminator that they claim can bypass antivirus and EDR software. <\/p>\n","protected":false},"author":2,"featured_media":3102,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[82,81,27],"class_list":["post-3101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-av","tag-edr","tag-security"],"_links":{"self":[{"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/posts\/3101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/comments?post=3101"}],"version-history":[{"count":4,"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/posts\/3101\/revisions"}],"predecessor-version":[{"id":3106,"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/posts\/3101\/revisions\/3106"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/media\/3102"}],"wp:attachment":[{"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/media?parent=3101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/categories?post=3101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/krsp.co\/agency\/wp-json\/wp\/v2\/tags?post=3101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}