Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender

New EDRStartupHinder Tool blocks antivirus and EDR services at startup on Windows 11 25H2 Defender

Posted on January 12, 2026January 12, 2026 By CWS

Safety researcher TwoSevenOneT, recognized for EDR evasion instruments like EDR-Freeze and EDR-Redir, unveiled EDRStartupHinder this week.

The instrument blocks antivirus and EDR providers at startup by redirecting vital System32 DLLs by way of Home windows Bindlink, demonstrated on Home windows Defender in Home windows 11 25H2.​

Antivirus and EDR providers function like commonplace Home windows providers however with enhanced safety from kernel drivers.

They run below SYSTEM privileges, auto-start on boot, and use Protected Course of Gentle (PPL) to forestall user-mode tampering. Configuration adjustments in consumer mode fail, and processes resist modification with out superior methods equivalent to EDR-Freeze.

Bindlink Startup Disruption

Earlier methods, like EDR-Redir, redirected EDR folders post-startup, however distributors hardened towards them. EDRStartupHinder preempts this by focusing on System32, which is important for all processes, together with EDRs.

EDRStartupHinder Instrument

Steps embody making a higher-priority service, Bindlinking a core DLL to an unsigned “corrupted” copy, leveraging PPL to crash the EDR on load failure, and cleansing up post-termination.

Service precedence attracts from BYOVD analysis, checking HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlServiceGroupOrder. The DLL should keep away from the KnownDLLs preload record, identifiable by way of Course of Monitor.

Accessible on GitHub, EDRStartupHinder takes parameters: OriginalLib (System32 DLL), FakeLib (copy location), ServiceName/Group (precedence), EDRProcess (goal like MsMpEng.exe).

It corrupts the PE header signature on FakeLib, registers as service, displays for EDR launch, applies/removes Bindlink dynamically. Customers should analysis EDR-specific DLLs and teams utilizing Course of Explorer boot logs.​

On a lab Home windows 11 25H2 system, focusing on MsMpEng.exe (Defender engine) and msvcp_win.dll (loaded at startup), with TDI service group precedence. Command: EDRStartupHinder.exe msvcp_win.dll C:TMPFakeLib DusmSVC-01 TDI MsMpEng.exe.

EDRStartupHinder startup

Put up-reboot, the service prompts first, redirects DLL; PPL-protected MsMpEng rejects the unsigned DLL and self-terminates.

Sysadmins ought to monitor bindlink.dll utilization, suspicious providers in high-priority teams, and System32 anomalies. Protection-in-depth contains KnownDLL expansions, signature enforcement audits, and minifilter logging. Distributors should harden DLL dependencies and startup sequencing.​

This method underscores Home windows mechanisms as double-edged swords for purple groups, efficient towards Defender and unnamed industrial EDRs/AVs in labs.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:25H2, Antivirus, Blocks, Defender, EDR, EDRStartupHinder, Services, Startup, Tool, Windows

Post navigation

Previous Post: Hackers Accessed University of Hawaii Cancer Center Patient Data; They Weren’t Immediately Notified
Next Post: New ‘Penguin’ Pig Butchering as a Service Selling PII, Stolen Accounts and Fraud Kits

Related Posts

Six New Microsoft Vulnerabilities Added to CISA’s KEV List Six New Microsoft Vulnerabilities Added to CISA’s KEV List Cyber Security News
Critical SQL Injection Flaw in Microsoft Manager Alerted by CISA Critical SQL Injection Flaw in Microsoft Manager Alerted by CISA Cyber Security News
Critical Apache ZooKeeper Flaws Demand Urgent Updates Critical Apache ZooKeeper Flaws Demand Urgent Updates Cyber Security News
New Frontiers In Identity-Based Access Control New Frontiers In Identity-Based Access Control Cyber Security News
Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects Threat Actors Leverage JSON Storage Services to Host and Deliver Malware Via Trojanized Code Projects Cyber Security News
AI-Powered Phishing and QR Code Threats Rise in 2025 AI-Powered Phishing and QR Code Threats Rise in 2025 Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark