{"id":168296,"date":"2024-09-11T13:15:53","date_gmt":"2024-09-11T13:15:53","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168296"},"modified":"2024-09-11T13:15:55","modified_gmt":"2024-09-11T13:15:55","slug":"ransomhub-ransomware-tdskiller-disable-edr","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168296\/malware\/ransomhub-ransomware-tdskiller-disable-edr.html","title":{"rendered":"RansomHub ransomware gang relies on Kaspersky TDSKiller tool to disable EDR"},"content":{"rendered":"
<\/div>\n

Researchers observed the RansomHub ransomware group using the TDSSKiller tool to disable endpoint detection and response (EDR) systems.<\/h2>\n\n\n\n

The RansomHub ransomware gang<\/a> is using the TDSSKiller tool <\/strong>to disable endpoint detection and response (EDR) systems, Malwarebytes ThreatDown Managed Detection and Response (MDR) team observed.<\/p>\n\n\n\n

TDSSKiller a legitimate tool developed by the cybersecurity firm Kaspersky to remove rootkits, the software could also disable EDR solutions through a command line script or batch file. <\/p>\n\n\n\n

The experts noticed that the ransomware group also used the LaZagne<\/a><\/strong> tool to harvest credentials.\u00a0During the case investigated by MDR, experts observed that LaZagne generated 60 file writes, likely logging extracted credentials, and performed 1 file deletion, likely to hide traces of the credential-harvesting activity.<\/p>\n\n\n\n

“Although both TDSSKiller and LaZagne have been used by attackers for years, this is the first record of RansomHub using them in its operations, with the TTPs not listed in\u00a0CISA\u2019s recently published advisory<\/a>\u00a0on RansomHub.” reads the Malwarebytes MDR’s report<\/strong><\/a>. “The tools were deployed following initial reconnaissance and network probing through admin group enumeration, such as\u00a0net1 group \"Enterprise Admins\" \/do.\u00a0<\/code>“<\/em><\/p>\n\n\n\n

RansomHub used TDSSKiller with the -dcsvc flag to try disabling critical security services, specifically targeting Malwarebytes Anti-Malware Service (MBAMService). The command aimed to disrupt security defenses by disabling this service.<\/p>\n\n\n\n

Command line<\/strong>:\u00a0tdsskiller.exe -dcsvc MBAMService\u00a0<\/code>where the -dcsvc flag was used to target specific services. In this instance, attackers attempted to disable\u00a0MBAMService<\/strong>.<\/p>\n\n\n

\n
\"TDSSKiller\"<\/a><\/figure><\/div>\n\n\n

RansomHub is a ransomware as a service (RaaS) that was employed in the operations of multiple threat actors. Microsoft reported that RansomHub was observed being deployed in post-compromise activity by the threat actor tracked as Manatee Tempest following initial access by Mustard Tempest via FakeUpdates<\/a>\/Socgholish <\/a>infections.<\/p>\n\n\n\n

Experts believe RansomHub is a rebrand of the\u00a0Knight ransomware<\/a>. Knight, also known as Cyclops 2.0, appeared in the threat landscape in May 2023. The malware targets multiple platforms, including Windows, Linux, macOS, ESXi, and Android. The operators used a double extortion model for their RaaS operation.<\/gwmw><\/p>\n\n\n\n

This isn’t the first time that security experts documented the use of the tool developed by Kaspersky.<\/p>\n\n\n\n

The Sangfor Cyber Guardian Incident Response team reported<\/a> that the LockBit ransomware<\/a> gang used the -dcsvc parameter of TDSSKiller as part of their attack chain.<\/gwmw><\/p>\n\n\n\n

Attackers use legitimate tools because are not blocked by security solutions.<\/p>\n\n\n\n

Malwarebytes shared indicators of compromise (IoCs) for these attacks and recommends:<\/p>\n\n\n\n