Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads

Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads

Posted on July 5, 2025July 5, 2025 By CWS

Cybersecurity researchers have uncovered a regarding improvement as malicious actors started exploiting SHELLTER, a industrial anti-virus and endpoint detection response (EDR) evasion framework, to deploy refined malware payloads.

Initially designed for professional penetration testing operations, this framework has been weaponized by cybercriminals since late April 2025, marking a major escalation in evasion capabilities accessible to menace actors.

The illicit use of SHELLTER represents a troubling development the place professional offensive safety instruments are repurposed for malicious actions.

The industrial framework, particularly Elite model 11.0 launched on April 16, 2025, offers superior capabilities permitting malware to bypass trendy safety options by refined obfuscation and evasion methods.

Its polymorphic code era and talent to embed malicious payloads inside professional purposes have made detection considerably more difficult.

Elastic Safety Labs researchers recognized a number of financially motivated campaigns using SHELLTER-protected payloads, together with deployment of infamous info stealers akin to LUMMA, RHADAMANTHYS, and ARECHCLIENT2.

These campaigns primarily focused content material creators and gaming communities by rigorously crafted phishing emails and malicious hyperlinks distributed through YouTube feedback and file-sharing platforms like MediaFire.

All analyzed samples share a constant license expiry timestamp of 2026-04-17 19:17:24.055000, suggesting use of a single illicitly acquired license.

Exercise Timeline (Supply – Elastic)

The distribution technique demonstrates refined social engineering ways, with attackers impersonating professional manufacturers together with Udemy, Skillshare, Pinnacle Studio, and Duolingo.

SHELLTER Unpacker (Supply – Elastic)

Victims are lured into downloading malicious archive information containing SHELLTER-protected executables, usually disguised as promotional content material or software program updates.

Superior Evasion Mechanisms and Technical Implementation

The technical sophistication of SHELLTER’s evasion capabilities represents a major problem for cybersecurity professionals.

The framework employs AES-128 CBC encryption to guard remaining payloads, with encryption keys both embedded immediately inside malware or fetched from attacker-controlled servers.

This dual-key method offers flexibility whereas sustaining sturdy cryptographic safety in opposition to evaluation efforts.

SHELLTER’s most notable characteristic is its implementation of polymorphic junk code insertion, producing legitimate-looking directions that serve no useful objective apart from complicated static evaluation instruments and signature-based detection programs.

Name stack of backdoored file (Supply – Elastic)

The framework makes use of oblique syscalls and name stack corruption methods to bypass user-mode API hooking mechanisms generally employed by EDR options.

These methods contain getting ready the stack with addresses of unpolluted syscall directions from ntdll.dll and utilizing return directions to redirect execution circulate.

The framework’s reminiscence safety mechanisms additional complicate evaluation by runtime encoding and decoding of important code sections.

SHELLTER repeatedly modifies reminiscence web page permissions utilizing features like NtQueryVirtualMemory and NtProtectVirtualMemory, guaranteeing delicate code stays obfuscated when not actively executing.

This dynamic safety scheme, mixed with virtualized atmosphere detection and debugging software identification, creates a number of protection layers in opposition to safety researchers and automatic evaluation programs.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Abused, Actors, Deploy, EDR, Evasion, Framework, InTheWild, Malware, Payloads, Threat

Post navigation

Previous Post: Police in Brazil Arrest a Suspect Over $100M Banking Hack
Next Post: The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses

Related Posts

Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Fired Intel Engineer Stolen 18,000 Files Many of which Were Classified as “Top Secret” Cyber Security News
Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users Microsoft to Disable Inline SVG Images Display to Outlook for Web and Windows Users Cyber Security News
Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Critical Zoom Clients for Windows Vulnerability Lets Attackers Escalate Privileges Cyber Security News
UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware UNC5518 Group Hacks Legitimate Websites to Inject Fake Captcha That Tricks Users to Execute Malware Cyber Security News
INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen Cyber Security News
How To Detect Them Early  How To Detect Them Early  Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News