Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used

Threat Actor Installed EDR on Their Systems, Revealing Workflows and Tools Used

Posted on September 10, 2025September 10, 2025 By CWS

A current incident uncovered how a risk actor inadvertently uncovered its total operational workflow by putting in a well-liked endpoint detection and response (EDR) agent on their very own attacking infrastructure.

The situation unfolded when the adversary, whereas evaluating numerous safety platforms, triggered alerts that led Huntress analysts to analyze uncommon telemetry knowledge.

Preliminary observations of system exercise and browser historical past hinted at subtle reconnaissance efforts, prompting researchers to delve deeper into the artifacts collected by the EDR system.

Inside hours of deployment, the agent recorded a variety of interactions indicative of malicious intent.

Huntress analysts famous that the distinctive machine identifier had appeared in prior compromise investigations, instantly flagging the host as adversarial.

Subsequent correlation of authentication logs and telemetry knowledge revealed patterns of credential theft, session token refreshes, and automatic tooling execution.

Researchers recognized makes an attempt to entry rotated session tokens and located proof of automated phishing campaigns orchestrated by way of bespoke scripts.

The affect of this unintentional set up can’t be overstated. For the primary time, defenders gained granular visibility into the day-to-day routines of a stay risk operator, from reconnaissance by way of to lively exploitation.

Google seek for Bitdefender, resulting in a Huntress advert (Supply – Huntress)

The risk actor’s day usually started with passive exterior scanning, later transitioning to focused exploitation of recognized organizations.

Detailed browser historical past entries confirmed in depth use of each public and subscription-based providers for reconnaissance, in addition to the deployment of residential proxy providers to anonymize visitors and evade detection.

Over the course of a three-month interval, the EDR telemetry captured a transparent evolution within the attacker’s workflow.

Early actions targeted on researching banking establishments and third-party distributors, whereas later levels revealed the adoption of automated workflows for phishing message technology.

Timeline (Supply – Huntress)

Huntress researchers recognized a gradual shift towards extra programmatic device utilization, with the adversary scripting repetitive duties to extend operational effectivity.

An infection Mechanism and Persistence Techniques

A deeper look into the an infection mechanism uncovers how the risk actor achieved preliminary entry and maintained a foothold inside goal environments.

Automated workflows (Supply – Huntress)

The adversary leveraged stolen session cookies extracted from Telegram Desktop cookie recordsdata utilizing a easy Python script. The script, executed through:-

from roadtx import PrtAuth

auth = PrtAuth(token_file=”victim_cookie.json”)
session = auth.purchase()
print(session)

This reveals how the attacker automated major refresh token extraction for Microsoft Entra and Workplace 365 providers.

As soon as legitimate tokens had been obtained, they had been used to authenticate into sufferer accounts with out triggering multifactor authentication or alerting endpoint defenses.

Persistence was achieved by deploying scheduled duties that often renewed session tokens and executed reconnaissance scripts. These duties had been registered within the Home windows Job Scheduler underneath inconspicuous names to mix with reliable processes.

Numerous instruments that the attacker could have used (Supply – Huntress)

Huntress analysts recognized these entries and noticed periodic outbound connections to attacker-controlled C2 servers, confirming ongoing management.

This uncommon visibility into real-world risk actor habits supplied invaluable insights for defenders. By dissecting the an infection and persistence methods, safety groups can craft focused detection guidelines and harden authentication workflows in opposition to related token-based assaults.

The collaboration between telemetry-driven evaluation and guide artifact assessment underscores the significance of complete EDR options in trendy safety operations.

Enhance your SOC and assist your staff shield your online business with free top-notch risk intelligence: Request TI Lookup Premium Trial.

Cyber Security News Tags:Actor, EDR, Installed, Revealing, Systems, Threat, Tools, workflows

Post navigation

Previous Post: Jaguar Land Rover Admits Data Breach Caused by Recent Cyberattack
Next Post: Lazarus Hackers Exploiting Git Symlink Vulnerability in Sophisticated Phishing Attack

Related Posts

New Black-Hat AI Tool Used by Hackers to Launch Cyberattacks New Black-Hat AI Tool Used by Hackers to Launch Cyberattacks Cyber Security News
GLOBAL GROUP’s Golang Ransomware Attacks Windows, Linux, and macOS Environments GLOBAL GROUP’s Golang Ransomware Attacks Windows, Linux, and macOS Environments Cyber Security News
WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System WhatsApp Vulnerabilities Leaks User’s Metadata Including Device’s Operating System Cyber Security News
Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst Palo Alto Networks Released A Mega Malware Analysis Tutorials Useful for Every Malware Analyst Cyber Security News
Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer Hackers Weaponize Fake Microsoft Teams Site to Deploy Odyssey macOS Stealer Cyber Security News
Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Red Bull-Themed Phishing Attacks Steal Job Seekers Login Credentials Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News