URL has been copied successfully!
A spoof antivirus makes Windows Defender disable security scans
URL has been copied successfully!

Collecting Cyber-News from over 60 sources

A spoof antivirus makes Windows Defender disable security scans

Persistent API-level spoofing: While WSC is typically guarded by mechanisms like Protected Process Light (PPL) and signature validation, Defendnot sidesteps these barriers by injecting its code into Taskmgr.exea system-signed, trusted process. From there, it registers the ghost antivirus entry under a spoofed name.Additionally, to ensure it sticks around, defendnot sets up persistence via Windows Task Scheduler, launching itself automatically at login.This POC broadly makes three revelations: how security products interact with the OS under the hood, API-level spoofing can trick even trusted components like Defender, and the sole reliance on WSC for AV detection might be risky.While Microsoft did not respond to emailed questions by the time of publication, there’s online chatter about Microsoft catching up to defendnot and currently flagging the tool as Win32/Sabsik.FL.!mla general heuristic classification used by Defender for potentially malicious or suspicious software.

First seen on csoonline.com

Jump to article: www.csoonline.com/article/3989194/a-spoof-antivirus-makes-windows-defender-disable-security-scans.html

Loading

Share via Email
Share on Facebook
Tweet on X (Twitter)
Share on Whatsapp
Share on LinkedIn
Share on Xing
Copy link