Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR

Posted on December 23, 2025December 23, 2025 By CWS

A brand new instrument named GhostLocker has been launched, demonstrating a novel approach to neutralize Endpoint Detection and Response (EDR) techniques by weaponizing the native Home windows AppLocker function.

Developed by safety researcher zero2504, the instrument highlights a elementary architectural vulnerability in fashionable EDR options: their reliance on userland parts for evaluation and reporting.​

In contrast to conventional EDR bypasses that try to take advantage of kernel drivers or carry out advanced reminiscence manipulation, GhostLocker leverages the inherent authority granted to system directors. The instrument makes use of AppLocker, Microsoft’s utility whitelisting framework launched in Home windows 7, to implement “Deny” guidelines towards EDR executables.​

The idea is easy however efficient: directors have the respectable energy to manage software program execution. GhostLocker automates this by deploying insurance policies that explicitly block EDR processes from launching or restarting.

The instrument presents two modes of operation: a dynamic model that enumerates operating processes to generate exact guidelines, and a static model that makes use of wildcard paths (e.g., *MsMpEng.exe) to dam targets with out prior enumeration.

​The analysis behind GhostLocker reveals that whereas AppLocker can not terminate already operating processes, a easy reboot after coverage utility renders the EDR ineffective.

Crucially, the instrument doesn’t block the EDR’s kernel drivers (*.sys). These drivers proceed to load, register callbacks, and acquire telemetry.​

Nonetheless, the analysis findings present that this telemetry turns into ineffective with out the corresponding userland providers. Trendy EDRs depend on user-mode parts to correlate occasions, carry out behavioral evaluation, and ship alerts to the cloud. When these userland “brains” are blocked by AppLocker, the EDR is successfully blinded, though its kernel “eyes” are nonetheless open.​

Throughout in depth testing towards business EDR merchandise, GhostLocker achieved full neutralization. Regardless of the blocking, administration consoles continued to report the brokers as “on-line” and “protected,” because the heartbeat mechanisms have been typically decoupled from the evaluation engines. Moreover, beforehand detected injection assaults went unnoticed as a result of the behavioral evaluation engines couldn’t execute.​

The instrument additionally demonstrates a definite benefit over Home windows Defender Software Management (WDAC) assaults. Whereas WDAC operates on the kernel stage to dam drivers, AppLocker insurance policies are strictly userland, making them simpler to deploy for focused blocking whereas sustaining the looks of a functioning system.​

The discharge emphasizes that this isn’t an exploit, however an abuse of respectable options. To defend towards this, organizations are suggested to observe for AppLocker coverage modifications by way of AppID.sys IOCTL alerts and to make sure their safety merchandise make the most of the Get-AppLockerFileInformation API to pre-validate their very own execution standing.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AppLocker, Control, EDR, GhostLocker, Neutralize, Tool, Windows

Post navigation

Previous Post: 574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings
Next Post: Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces Appeal

Related Posts

Rhadamanthys Infostealer Leveraging ClickFix Technique to Steal Login Credentials Cyber Security News
SoupDealer Malware Bypasses Every Sandbox, AV’s and EDR/XDR in Real-World Incidents Cyber Security News
New ShadowCaptcha Attack Exploiting Hundreds of WordPress Sites to Tricks Victims into Executing Malicious Commands Cyber Security News
IRGC Hacker Groups Attacking Targeted Financial, Government, and Media Organizations Cyber Security News
Weaponized Chrome Extension Affects 1.7 Million Users Despite Google’s Verified Badges Cyber Security News
Critical Sophos Firewall Vulnerabilities Enables pre-auth Remote Code Execution Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical n8n Automation Platform Vulnerability Enables RCE Attacks
  • Nissan Confirms Impact From Red Hat Data Breach
  • Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware
  • Feds Seize Password Database Used in Massive Bank Account Takeover Scheme
  • INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical n8n Automation Platform Vulnerability Enables RCE Attacks
  • Nissan Confirms Impact From Red Hat Data Breach
  • Threat Actors Poses as Korean TV Programs Writer to Trick Victims and Install Malware
  • Feds Seize Password Database Used in Massive Bank Account Takeover Scheme
  • INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark