Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders

Posted on October 20, 2025October 20, 2025 By CWS

A brand new device known as DefenderWrite exploits whitelisted Home windows applications to bypass protections and write arbitrary recordsdata into antivirus executable folders, probably enabling malware persistence and evasion.

Developed by cybersecurity knowledgeable Two Seven One Three, the device demonstrates a novel method for penetration testers and pink groups to drop payloads in extremely protected places while not having kernel-level entry.​

This improvement highlights ongoing challenges in antivirus self-protection mechanisms, the place folders housing AV executables are sometimes shielded from modifications to forestall tampering.

By figuring out system applications that antivirus distributors whitelist for updates and installations, attackers can leverage these exceptions to inject malicious DLLs, turning the AV’s personal safeguards towards it.

The device’s launch, shared by way of GitHub, has sparked discussions on the stability between operational requirements for AV software program and safety dangers in enterprise environments.​

Exploiting Whitelisted Applications for Arbitrary Writes

The core innovation behind DefenderWrite lies in systematically scanning Home windows executables to search out these permitted to entry AV folders.

By enumerating all .exe recordsdata in directories like C:Home windows, then use course of creation and distant DLL injection to check write capabilities into protected paths.

A customized DLL performs the file write operation and studies success or failure, permitting the device to pinpoint exploitable processes like msiexec.exe with out triggering defenses.​

In testing on Home windows 11 24H2 with Microsoft Defender model 4.18.25070.5-0, the strategy recognized 4 such applications: msiexec.exe, Register-CimProvider.exe, svchost.exe, and lsass.exe.

As an illustration, launching msiexec.exe and injecting the DLL permits writing a file immediately into Defender’s set up listing, as demonstrated in lab experiments.

This strategy extends past Microsoft Defender; comparable whitelisting vulnerabilities had been confirmed in BitDefender, TrendMicro Antivirus Plus, and Avast, although particular particulars stay undisclosed to encourage impartial verification.

DefenderWrite helps key parameters for focused operations, together with TargetExePath for the host executable, FullDLLPath for the injectable library, and FileToWrite for the vacation spot path inside the AV folder. An non-compulsory “c” flag simplifies copying the DLL to the desired location remotely.

Accompanying the binary is a PowerShell script, Run_Check.ps1, which automates scanning C:Home windows executables and logging whitelisted ones for additional exploitation.

Customers can customise the script for his or her atmosphere, making it appropriate for pink crew simulations or defensive assessments.

The GitHub repository supplies full supply code and documentation, emphasizing moral use in licensed testing solely. Two Seven One Three, lively on X as @TwoSevenOneT, shares extra pentest insights and encourages group experiments to strengthen AV resilience.​

As soon as a malicious payload resides in an AV folder, it advantages from the identical exceptions that defend professional recordsdata, evading scans and probably reaching long-term persistence.

This method underscores the necessity for distributors to audit whitelisting insurance policies and implement stricter course of isolation throughout updates. Whereas not a zero-day vulnerability, DefenderWrite reveals systemic gaps that would support real-world assaults if unaddressed.​

Organizations ought to monitor AV replace mechanisms and think about layered defenses past conventional file permissions. With the device’s open availability, count on broader adoption in safety analysis circles to push for improved protections throughout well-liked antivirus options.​

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, DefenderWrite, DLLs, Executable, Folders, Inject, Malicious, Tool

Post navigation

Previous Post: China Accuses US of Cyberattack on National Time Center
Next Post: MSS Claims NSA Used 42 Cyber Tools in Multi-Stage Attack on Beijing Time Systems

Related Posts

Critical RCE Vulnerabilities in AI inference Engines Exposes Meta, Nvidia and Microsoft Frameworks Cyber Security News
Gujarat Teen Behind 50+ Cyberattacks During ‘Operation Sindoor’ Arrested Cyber Security News
PupkinStealer Attacks Windows System to Steal Login Credentials & Desktop Files Cyber Security News
New Clickfix Attack Promises “Free WiFi” But Delivers Powershell Based Malware Cyber Security News
Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Cyber Security News
North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New FvncBot Android Banking Attacking Users to Log Keystrokes and Inject Malicious Payloads
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Critical React2Shell Flaw Added to CISA KEV After Confirmed Active Exploitation
  • Researchers Hack Google’s Gemini CLI Through Prompt Injections in GitHub Actions
  • 2.15M Web Services Running Next.js Exposed Over Internet, Active Exploitation Underway – Patch Now

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark