Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RealBlindingEDR Tool That Permanently Turn off AV/EDR Using Kernel Callbacks

Posted on October 13, 2025October 13, 2025 By CWS

An open-source instrument known as RealBlindingEDR permits attackers to blind, completely disable, or terminate antivirus (AV) and endpoint detection and response (EDR) software program by clearing crucial kernel callbacks on Home windows programs.

Launched on GitHub in late 2023, the utility leverages signed drivers for arbitrary reminiscence learn and write operations, bypassing protections like PatchGuard to focus on six main kernel callback varieties. This growth raises alarms for cybersecurity professionals, because the instrument has been adopted by ransomware teams resembling Crypto24 in latest assaults.​

The instrument’s creator emphasizes analysis functions solely, disclaiming any malicious use, whereas offering detailed implementation insights in a Chinese language-language evaluation article.

By exploiting susceptible drivers like echo_driver.sys or dbutil_2_3.sys, RealBlindingEDR positive aspects kernel-level entry with out triggering instant detection.

Customers obtain the executable from releases, pair it with a suitable driver, and execute instructions like “RealBlindingEDR.exe c:echo_driver.sys 1” for blinding mode or variants for shutdowns.

Screenshots hooked up to the repository display real-time removing of callbacks, permitting file deletions and course of terminations that AV instruments sometimes block.​

RealBlindingEDR systematically erases callbacks registered by way of capabilities resembling CmRegisterCallback(Ex), ObRegisterCallbacks, PsSetCreateProcessNotifyRoutine(Ex), PsSetCreateThreadNotifyRoutine(Ex), PsSetLoadImageNotifyRoutine(Ex), and MiniFilter drivers.

These mechanisms enable AV/EDR options to watch course of creation, thread exercise, picture loading, registry adjustments, file operations, and object handles. As an illustration, eradicating ObRegisterCallbacks eliminates deal with safety, enabling bizarre admin customers to kill EDR processes that may in any other case resist termination.​

The method includes finding world kernel constructions like PsProcessType or FltGlobals by exported capabilities in ntoskrnl.exe and fltmgr.sys.

It then traverses linked lists of callback entries, nullifying perform pointers or rerouting listing heads to evade PatchGuard-induced blue screens. Adaptation for Home windows 7 to 11 and numerous servers ensures broad compatibility, with ongoing points tracked by way of GitHub.​

Examined in opposition to merchandise together with 360 Safety Guard, Tencent Pc Supervisor, Kaspersky Endpoint Safety, Home windows Defender, and AsiaInfo EDR, the instrument achieves three key outcomes with out halting the goal’s foremost course of, preserving communication with central administration to keep away from alerts.

Blinding mode prevents monitoring of delicate behaviors like malware drops or privilege escalations. Everlasting disablement follows by deleting protected information or registry entries post-callback removing, surviving reboots. Killing is easy as soon as object protections vanish.​

Demos present, for instance, terminating AV processes by way of Activity Supervisor and erasing self-protected information, as depicted in repository pictures of command outputs and before-and-after states.​

Whereas supposed for moral analysis, RealBlindingEDR’s simplicity, requiring solely a signed driver and admin rights, poses dangers for purple teaming and real-world threats.

Ransomware operators like Crypto24 have built-in it into multi-stage assaults, impairing defenses earlier than encryption. Organizations ought to monitor for susceptible driver hundreds and kernel anomalies utilizing superior EDR with behavioral analytics.​

Microsoft and AV distributors urge driver signature enforcement and instruments like Driver Signature Enforcement Overrider mitigations. Future updates might goal ETW suppliers and WFP callbacks, escalating kernel-level evasion ways.

Safety groups are suggested to evaluation endpoint logs for uncommon sys file accesses and prioritize least-privilege driver utilization.​

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AVEDR, Callbacks, Kernel, Permanently, RealBlindingEDR, Tool, Turn

Post navigation

Previous Post: SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups
Next Post: New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

Related Posts

DarkCloud Stealer Attacking Financial Companies With Weaponized RAR Attachments Cyber Security News
2025-8088 – WinRAR 0-Day Path Traversal Vulnerability Exploited to Execute Malware Cyber Security News
PoC Exploits for CitrixBleed2 Flaw Released – Attackers Can Exfiltrate 127 Bytes Per Request Cyber Security News
CISA Warns of TeleMessage TM SGNL Vulnerabilities Exploited in Attacks Cyber Security News
New Rust Based InfoStealer Extracts Sensitive Data from Chromium-based Browsers Cyber Security News
Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs
  • RealBlindingEDR Tool That Permanently Turn off AV/EDR Using Kernel Callbacks
  • SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups
  • Oracle E-Business Suite RCE Vulnerability Exposes Sensitive Data to Hackers Without Authentication
  • New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs
  • RealBlindingEDR Tool That Permanently Turn off AV/EDR Using Kernel Callbacks
  • SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups
  • Oracle E-Business Suite RCE Vulnerability Exposes Sensitive Data to Hackers Without Authentication
  • New Oracle E-Business Suite Bug Could Let Hackers Access Data Without Login

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News