Defenseless Defenders: Exploring Endpoint Detection and Response (EDR) Inhibitors

Introduction

Security products are designed to preserve system integrity, maintain visibility, and constrain the operational freedom adversaries require to accomplish their objectives. Consequently, adversaries increasingly treat these protections not merely as obstacles to evade but as infrastructure to dismantle. Rather than focusing exclusively on evading detection logic, operators deliberately target the defensive mechanisms that sustain visibility, enforcement, and response, with the objective of blinding, degrading, or neutralizing endpoint protection.

Historically, attempts to neutralize endpoint protection relied heavily on overt techniques including tampering with security processes, deleting agent binaries, or removing protections through administrative utilities. While effective, these approaches were operationally fragile, noisy, and easily detectable. Contemporary operations demonstrate a significant progression toward more sophisticated and stealthy techniques that leverage legitimate Windows features and misconfigured or vulnerable components to achieve the same objectives with a substantially reduced detection footprint.

These techniques operate across multiple architectural layers of the Windows operating system. At the user layer, adversaries abuse legitimate platform services such as the Windows Filtering Platform (WFP), which can be manipulated to silently disrupt outbound telemetry and management communications, or Windows Error Reporting (WER), whose crash-handling workflows can be coerced into suspending or deadlocking security processes. At the kernel layer, Bring Your Own Vulnerable Driver (BYOVD) has emerged as a strategically significant capability, enabling operators to load legitimately signed yet vulnerable drivers to obtain arbitrary kernel-level primitives, including manipulation of protected processes, security product structures, and callback routines.

Despite differing in privilege requirements and implementation complexity, these approaches converge on a shared operational objective: the systematic erosion of endpoint visibility and monitoring continuity, enabling sustained malicious activity with reduced oversight.

Over recent years, these behaviors have been consistently observed across both state-sponsored adversaries conducting long-term espionage activities and financially motivated ransomware affiliates focused on maximizing operational impact prior to containment. What was once considered specialized tradecraft associated with highly sophisticated operators has become standardized within modern playbooks, lowering the threshold required for operators to systematically degrade endpoint visibility before pursuing their intended objectives.

The accelerating operationalization of these capabilities has introduced a measurable defensive blind spot, in which adversaries increasingly treat the neutralization of endpoint protections not as a contingency but as a preparatory requirement.

In response to this evolution, AttackIQ is introducing a dedicated offering that incorporates widely observed inhibitor utilities and a curated set of legitimate and purpose-built drivers used in real-world intrusions. These are associated with a collection of post-compromise behaviors that AttackIQ collectively refers to as EDR Inhibitors, a spectrum of utilities and techniques designed to suppress, degrade, or neutralize endpoint protection capabilities. These behaviors range from transient disruption to persistent kernel-level interference, achieved by manipulating the mechanisms responsible for telemetry collection, policy enforcement, and response actions.

New Endpoint Detection and Response (EDR) Inhibitors

  • EDR Inhibition Utilities: Set of Endpoint Detection and Response (EDR) inhibition utilities observed in real-world intrusion activity that deliberately target the defensive mechanisms responsible for visibility, enforcement, and response, with the objective of blinding, degrading, or neutralizing endpoint protection.

    The utilities included are not theoretical constructs or isolated proof-of-concept (PoC) demonstrations. Each has been operationalized by adversaries across multiple sophistication levels, ranging from opportunistic operators to highly advanced groups, reflecting the growing normalization of endpoint suppression as a distinct post-compromise phase.
  • Legitimately Signed Vulnerable Drivers: Curated selection of legitimately signed yet vulnerable kernel-mode drivers that have been directly or indirectly abused by adversaries to suppress or interfere with endpoint detection and response capabilities.

    Although distributed as components of trusted hardware or software platforms, these drivers contain design or implementation flaws that expose powerful kernel-level capabilities. Their valid digital signatures allow them to load under default Windows Driver Signature Enforcement (DSE) policies unless explicitly restricted through driver blocklisting or application control mechanisms.
  • Purpose-Built Malicious Drivers: Curated selection of malicious kernel-mode drivers that intentionally developed or repurposed by adversaries to suppress or interfere with endpoint detection and response capabilities. Unlike legitimately signed but vulnerable drivers, these drivers are purpose-built components engineered to manipulate protected kernel structures, tamper with security products, or suppress telemetry once loaded. Rather than exposing unintended attack surfaces, these drivers operationalize deliberate defense evasion logic at the kernel level.

Additionally, thirteen new malware emulations are introduced, each modeling ransomware strains known to operationalize these techniques as part of their operational tradecraft.

  • New! AvosLocker Ransomware – 2023-10 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! BianLian Ransomware – 2024-01 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Crytox Ransomware – 2022-09 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Dharma Ransomware – 2023-01 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! GlobeImposter Ransomware – 2022-10 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Hive Ransomware – 2023-02 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Kasseika Ransomware – 2024-01 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Medusa Ransomware – 2024-01 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! MedusaLocker Ransomware – 2022-08 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Phobos Ransomware – 2024-02 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Play Ransomware – 2025-06 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! RobbinHood Ransomware – 2020-02 – Associated Tactics, Techniques and Procedures (TTPs)
  • New! Trigona Ransomware – 2023-11 – Associated Tactics, Techniques and Procedures (TTPs)

Complementary Emulations

These are complemented by fifteen existing emulations developed by the Adversary Research Team (ART), collectively providing structured coverage of ransomware operations that have demonstrably incorporated endpoint suppression behaviors into their workflows. Together, these emulations enable defenders to evaluate their resilience against adversaries that deliberately degrade defensive capabilities rather than merely attempting to evade them.

  • Akira Ransomware – 2024-12- Associated Tactics, Techniques and Procedures (TTPs) 
  • Black Basta Ransomware – 2024-07 – Associated Tactics, Techniques and Procedures (TTPs)
  • BlackByte Ransomware – 2024-08 – Associated Tactics, Techniques and Procedures (TTPs)
  • BlackCat Ransomware – 2022-11 – Associated Tactics, Techniques and Procedures (TTPs)
  • BlackSuit Ransomware – 2024-08 – Associated Tactics, Techniques and Procedures (TTPs)
  • Charon Ransomware – 2025-08 – Associated Tactics, Techniques and Procedures (TTPs)
  • Cuba Ransomware – 2023-09 – Associated Tactics, Techniques and Procedures (TTPs)
  • DragonForce Ransomware – 2024-09- Associated Tactics, Techniques and Procedures (TTPs) 
  • Embargo Ransomware – 2024-10 – Associated Tactics, Techniques and Procedures (TTPs)
  • INC Ransomware – 2024-10 – Associated Tactics, Techniques and Procedures (TTPs) 
  • Lynx Ransomware – 2024-10 – Associated Tactics, Techniques and Procedures (TTPs)
  • Qilin Ransomware – 2025-10 – Associated Tactics, Techniques and Procedures (TTPs) 
  • RansomHub Ransomware – 2025-01 – Associated Tactics, Techniques and Procedures (TTPs)
  • Rhysida Ransomware – 2025-04 – Associated Tactics, Techniques and Procedures (TTPs)
  • Ryuk Ransomware – 2020-03 – Associated Tactics, Techniques and Procedures (TTPs)

For defenders, executing these emulations provides a practical approach to measuring resilience against adversaries that deliberately prioritize the degradation of defensive controls. When implemented in conjunction with Microsoft’s Protections and Guidelines as well as the Detection and Validation Considerations outlined in this report, these emulations enable security teams to empirically assess the organization’s ability to withstand techniques specifically designed to suppress, impair, or destabilize defensive capability.

By systematically validating how security technologies perform when visibility, enforcement, and response capabilities are manipulated, organizations can identify structural weaknesses before they are operationalized.

Explore EDR inhibitors—how attackers disable endpoint defenses, weaponize Windows, and validate your controls still work.

Download the Full Report

Francis Guibernau

Francis conducts in-depth threat research and analysis to design and create highly sophisticated and realistic adversary emulations. He also coordinates the CTI project, which focuses on researching, analyzing, tracking, and documenting adversaries, malware families, and cybersecurity incidents. Francis has extensive experience in adversary intelligence, encompassing both Nation-State and eCrime threats, as well as in vulnerability assessment and management, having previously worked at Deloitte and BNP Paribas.

Related Posts