Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass

Threat Actors Advertised NtKiller Malware on Dark Web Claiming Terminate Antivirus and EDR Bypass

Posted on December 24, 2025December 24, 2025 By CWS

A malicious actor generally known as AlphaGhoul has begun selling a instrument referred to as NtKiller, designed to silently shut down antivirus software program and endpoint detection instruments.

The instrument was posted on an underground discussion board the place criminals collect to purchase and promote hacking providers. In keeping with the commercial, NtKiller will help attackers keep away from detection whereas working their malware on contaminated computer systems.

The emergence of NtKiller represents a big problem for organizations counting on conventional safety instruments.

The risk actor claims that the instrument can work in opposition to many fashionable safety options, together with Microsoft Defender, ESET, Kaspersky, Bitdefender, and Development Micro.

Extra regarding is the assertion that it could bypass enterprise-grade EDR options when working in aggressive modes. KrakenLabs analysts famous the malware’s means to stay hidden via early-boot persistence mechanisms, making it exceptionally tough for safety groups to detect and take away as soon as activated.

KrakenLabs researchers recognized that NtKiller operates via a modular pricing construction, with the core performance priced at $500, whereas further options like rootkit functionality and UAC bypass every value an additional $300.

This pricing mannequin suggests the instrument has been refined for industrial sale throughout the cybercriminal group.

The instrument’s claimed capabilities lengthen past easy course of termination, together with help for superior evasion strategies like HVCI disabling, VBS manipulation, and reminiscence integrity circumvention.

Technical capabilities

The technical capabilities attributed to NtKiller make it significantly harmful within the palms of skilled attackers.

Key particulars (Supply – X)

The instrument’s early-boot persistence mechanism works by establishing itself throughout system startup, earlier than many safety monitoring programs totally activate.

This timing benefit permits malicious payloads to execute in an setting the place detection is minimal.

Moreover, the anti-debugging and anti-analysis protections stop researchers and automatic instruments from inspecting the malware’s habits, creating a big data hole about its precise capabilities versus advertising claims.

The silent UAC bypass possibility represents one other crucial technical function. Person Account Management bypass permits malware to achieve elevated system privileges with out triggering normal Home windows prompts which may alert customers to suspicious exercise.

Mixed with rootkit performance, attackers may preserve persistent entry to compromised programs whereas remaining invisible to plain safety monitoring.

You will need to observe that these capabilities haven’t been independently verified by third-party researchers, and the precise effectiveness of NtKiller stays unclear.

Organizations ought to preserve vigilance and guarantee their safety instruments embody behavioral detection capabilities past signature-based identification to counter such rising threats.

Comply with us on Google Information, LinkedIn, and X to Get Extra Immediate Updates, Set CSN as a Most popular Supply in Google.

Cyber Security News Tags:Actors, Advertised, Antivirus, Bypass, Claiming, Dark, EDR, Malware, NtKiller, Terminate, Threat, Web

Post navigation

Previous Post: 3 Ways to Protect Your Business in 2026
Next Post: Threat Actors Using Weaponized AV-themed Word and PDF Documents to Attack Israeli Organizations

Related Posts

Microsoft Upgrades .NET Bounty Program with Rewards Up to ,000 Microsoft Upgrades .NET Bounty Program with Rewards Up to $40,000 Cyber Security News
Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments Scattered Lapsus$ Hunters Registered 40+ Domains Mimicking Zendesk Environments Cyber Security News
Nimbus Manticore Attacking Defense and Telecom Sectors With New Malware Nimbus Manticore Attacking Defense and Telecom Sectors With New Malware Cyber Security News
Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Jetflicks Illegal Paid Streaming Service Operators Jailed for 7 Years Cyber Security News
Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Hackers Using CastleRAT Malware to Attack Windows Systems and Gain Remote Access Cyber Security News
Critical SQL Injection Flaw in Microsoft Manager Alerted by CISA Critical SQL Injection Flaw in Microsoft Manager Alerted by CISA Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark