Source: BleepingComputer
Author: Bill Toulas
URL: https://www.bleepingcomputer.com/news/security/new-blacksanta-edr-killer-spotted-targeting-hr-departments/
ONE SENTENCE SUMMARY:
A Russian-speaking actor spear-phished HR with ISO “resumes,” deploying stealthy loaders and BlackSanta to disable EDR using BYOD drivers.
MAIN POINTS:
- Russian-speaking threat actor targeted HR departments for over a year with malware.
- Initial access likely used spear-phishing emails directing victims to cloud-hosted ISO files.
- Malicious ISOs impersonated resumes and were hosted on services like Dropbox.
- ISO contained LNK masquerading as PDF, PowerShell script, image, and ICO file.
- LNK executed PowerShell to extract steganographic payload from image into memory.
- ZIP download included legitimate SumatraPDF plus malicious DWrite.dll for DLL sideloading.
- Malware fingerprinted hosts, contacted C2, and evaded sandboxes, VMs, and debuggers.
- Windows Defender was weakened, disk-write tests performed, and payloads ran via process hollowing.
- BlackSanta EDR killer reduced alerts, altered Defender exclusions, and lowered telemetry/submission settings.
- BYOD drivers RogueKiller and IObitUnlocker enabled kernel-level unlocking and termination of security processes.
TAKEAWAYS:
- HR-focused lures exploiting resume workflows remain highly effective for initial compromise.
- ISO/LNK plus PowerShell and steganography form a stealthy, memory-resident infection chain.
- DLL sideloading with trusted executables helps attackers blend malicious code into legitimate processes.
- EDR killers increasingly rely on kernel-level BYOD techniques to reliably disable defenses.
- Strong opsec and resilient infrastructure can keep campaigns undetected even when C2 is intermittently unavailable.