Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver

Posted on October 27, 2025October 27, 2025 By CWS

A brand new device referred to as EDR-Redir has emerged, permitting attackers to redirect or isolate the executable folders of common Endpoint Detection and Response (EDR) options.

Demonstrated by cybersecurity researcher TwoSevenOneT, the method leverages Home windows’ Bind Filter driver (bindflt.sys) and Cloud Filter driver (cldflt.sys) to undermine EDR protections with out requiring kernel-level entry.

This user-mode exploit, rooted within the Carry Your Personal Susceptible Driver (BYOVD) strategy, might allow attackers to disable defenses, inject malicious code, or hijack processes, leaving techniques susceptible to undetected intrusions.

The vulnerability stems from Home windows 11’s Bind Hyperlink function, launched in model 24H2. Bind Hyperlinks present filesystem namespace redirection through digital paths, managed by the bindflt.sys minifilter driver.

Not like conventional symbolic hyperlinks, which EDRs actively monitor and block utilizing mechanisms like Microsoft’s RedirectionGuard, Bind Hyperlinks function transparently on the driver degree.

They map digital paths to actual ones, native or distant, with out creating bodily information, inheriting permissions from the goal whereas remaining invisible to most functions.

This subtlety permits attackers with administrator privileges to carry out learn and open operations on protected EDR folders, that are usually locked in opposition to writes.

EDR-Redir, obtainable as an open-source device on GitHub, simplifies the method with easy instructions. As an example, operating “EDR-Redir.exe bind C:TMP123 C:TMP456” creates a digital path at C:TMP123 that redirects all interactions to C:TMP456.

The researcher examined this in opposition to a number of EDRs. With Elastic Defend and Sophos Intercept X, the device efficiently redirected their executable folders to attacker-controlled places.

Sophos EDR Break

Elastic EDR

As soon as redirected, adversaries might drop DLLs for course of hijacking, insert malicious executables, or empty the folder to halt EDR operations on reboot. Notably, these Bind Hyperlinks don’t persist throughout restarts, requiring a scheduled activity or service for automation.

Bypassing Home windows Defender with Cloud Filter Tips

Home windows Defender proved extra resilient to direct Bind Hyperlink redirection, doubtless resulting from its built-in protections. Nevertheless, the researcher devised a workaround utilizing the Cloud Information API (CFAPI), powered by cldflt.sys.

Sync Fail

This API, designed for sync engines like OneDrive, allows on-demand file entry by means of placeholder information. By invoking CfRegisterSyncRoot with minimal insurance policies basically an incomplete registration EDR-Redir registers the Defender folder as a “sync root.”

This corrupts entry, stopping the EDR from studying or writing to its listing. Put up-reboot, Defender’s providers fail to begin, successfully isolating it.

Not like Bind Hyperlinks, this Cloud Filter methodology persists with out further setup, making it notably stealthy. A demo video shared by the researcher illustrates the method, displaying Defender’s folder turning into inaccessible after registration.

Assessments confirmed related efficacy in opposition to two unnamed industrial EDRs, highlighting a broad danger.

This method underscores a rising problem: EDRs should evolve past user-mode symlink defenses to scrutinize minifilter interactions. Attackers achieve full management over EDR behaviors, probably evading detection in red-team workouts or actual breaches.

Organizations ought to audit administrator privileges, monitor for uncommon driver masses, and apply Home windows patches promptly. Distributors like Microsoft, Elastic, and Sophos are urged to reinforce folder protections in opposition to these API abuses.

As endpoint threats intensify, instruments like EDR-Redir remind us that even strong defenses can falter on ignored filesystem options.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:BIND, Breaks, Cloud, Driver, EDR, EDRRedir, Exploiting, Filter, Tool

Post navigation

Previous Post: New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens
Next Post: ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands

Related Posts

Threat actors Breach High Value targets like Google in Salesforce Attacks Cyber Security News
Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems Cyber Security News
TARmageddon Vulnerability In Rust Library Let Attackers Replace Config Files And Execute Remote Codes Cyber Security News
Google Confirms Data Breach – Notifying Users Affected By the Cyberattack Cyber Security News
46,000+ Grafana Instances Exposed to Malicious Account Takeover Attacks Cyber Security News
New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chrome Zero-Day Exploitation Linked to Hacking Team Spyware
  • Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain
  • ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands
  • New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver
  • New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chrome Zero-Day Exploitation Linked to Hacking Team Spyware
  • Infamous Cybercriminal Forum BreachForums Is Back Again With A New Clear Net Domain
  • ChatGPT Atlas Browser Can Be Tricked by Fake URLs into Executing Hidden Commands
  • New EDR-Redir Tool Breaks EDR Exploiting Bind Filter and Cloud Filter Driver
  • New CoPhish Attack Exploits Copilot Studio to Exfiltrate OAuth Tokens

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News