EDR Killers: Evolving Tools in Ransomware Operations
TL;DR ESET researchers reveal an increasing reliance on EDR killers in ransomware attacks, highlighting their role in disabling endpoint detection and response solutions before the deployment of encryptors. The study identifies notable shifts in the tools used, including a rise in driverless methods and the commercialization of these tools, complicating attribution and defense efforts.
Main Analysis
Recent research by ESET focuses on the growing use of EDR killers—software tools intended to disrupt security mechanisms during ransomware attacks. Traditionally, attackers exploited vulnerable drivers through the Bring Your Own Vulnerable Driver technique. However, ESET’s telemetry data shows that a diverse range of nearly 90 EDR killers are actively employed in the wild, including script-based and anti-rootkit tools. These tools not only simplify the attack process by providing a reliable method to disable defenses but also indicate a maturity in the ransomware-as-a-service model.
The study emphasizes that affiliates, rather than operators, primarily choose EDR killers, leading to enhanced diversity in tooling. This distinction complicates attribution, as common drivers often reappear across unrelated malicious efforts, showcasing a misalignment in security assessments that rely heavily on driver-based connections. Moreover, ESET reports a noticeable increase in driverless disruption methods, which complicates defense strategies further by obscuring indicators of compromise.
ESET also points to the influence of artificial intelligence in developing some EDR killers. For instance, a recent tool utilized by the Warlock group incorporated trial-and-error mechanisms to exploit drivers, suggesting an AI-driven process. This indicates that advancements in AI could potentially accelerate the proliferation of these disruptive tools in future ransomware operations.
Defensive Context
Organizations need to be acutely aware that the use of EDR killers is not merely an elevated risk but a concrete operational reality in modern ransomware attacks. Businesses employing EDR solutions, particularly those with critical infrastructure or sensitive data, are the most vulnerable to these tactics. Companies that have legacy systems dependent on older software may find their environments significantly at risk due to reliance on vulnerable drivers frequently targeted by EDR killers.
Understanding this landscape is crucial. The mere existence of vulnerable drivers in the ecosystem should not be the sole focus; attackers are increasingly adopting creative methods that extend beyond traditional driver exploitation. Organizations with comprehensive detection solutions must bolster real-time monitoring capabilities to intercept these EDR killers before they can disable their endpoint protection.
Why This Matters
The reliance on EDR killers poses significant real-world risks for sectors handling sensitive information—healthcare, finance, and critical infrastructure firms are particularly affected. By prioritizing EDR killers in attack strategies, attackers can execute ransomware operations swiftly and quietly, leading to potentially devastating financial and reputational impacts.
Indicators of Compromise (IOCs)
Details provided by ESET include notable hashes for specific EDR killers:
- AbyssKiller: SHA-1
54547180A99474B0DBA289D92C4A8F3EEA78B531 - ABYSSWORKER rootkit: SHA-1
75F85CAEA52FE5A124FA77E2934ABD3161690ADD - EDR-Freeze: SHA-1
1E7567C0D525AD037FBBBAFB643BF40541994411 - Susanoo: SHA-1
083F604377D74C4377822EF35021E34AD7DACEEA
These indicators can assist security teams in detecting the presence of EDR killers within their environments, supporting efforts to mitigate attacks effectively.



