Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

RealBlindingEDR Tool That Permanently Turn off AV/EDR Using Kernel Callbacks

Posted on October 13, 2025October 13, 2025 By CWS

An open-source instrument known as RealBlindingEDR permits attackers to blind, completely disable, or terminate antivirus (AV) and endpoint detection and response (EDR) software program by clearing crucial kernel callbacks on Home windows programs.

Launched on GitHub in late 2023, the utility leverages signed drivers for arbitrary reminiscence learn and write operations, bypassing protections like PatchGuard to focus on six main kernel callback varieties. This growth raises alarms for cybersecurity professionals, because the instrument has been adopted by ransomware teams resembling Crypto24 in latest assaults.​

The instrument’s creator emphasizes analysis functions solely, disclaiming any malicious use, whereas offering detailed implementation insights in a Chinese language-language evaluation article.

By exploiting susceptible drivers like echo_driver.sys or dbutil_2_3.sys, RealBlindingEDR positive aspects kernel-level entry with out triggering instant detection.

Customers obtain the executable from releases, pair it with a suitable driver, and execute instructions like “RealBlindingEDR.exe c:echo_driver.sys 1” for blinding mode or variants for shutdowns.

Screenshots hooked up to the repository display real-time removing of callbacks, permitting file deletions and course of terminations that AV instruments sometimes block.​

RealBlindingEDR systematically erases callbacks registered by way of capabilities resembling CmRegisterCallback(Ex), ObRegisterCallbacks, PsSetCreateProcessNotifyRoutine(Ex), PsSetCreateThreadNotifyRoutine(Ex), PsSetLoadImageNotifyRoutine(Ex), and MiniFilter drivers.

These mechanisms enable AV/EDR options to watch course of creation, thread exercise, picture loading, registry adjustments, file operations, and object handles. As an illustration, eradicating ObRegisterCallbacks eliminates deal with safety, enabling bizarre admin customers to kill EDR processes that may in any other case resist termination.​

The method includes finding world kernel constructions like PsProcessType or FltGlobals by exported capabilities in ntoskrnl.exe and fltmgr.sys.

It then traverses linked lists of callback entries, nullifying perform pointers or rerouting listing heads to evade PatchGuard-induced blue screens. Adaptation for Home windows 7 to 11 and numerous servers ensures broad compatibility, with ongoing points tracked by way of GitHub.​

Examined in opposition to merchandise together with 360 Safety Guard, Tencent Pc Supervisor, Kaspersky Endpoint Safety, Home windows Defender, and AsiaInfo EDR, the instrument achieves three key outcomes with out halting the goal’s foremost course of, preserving communication with central administration to keep away from alerts.

Blinding mode prevents monitoring of delicate behaviors like malware drops or privilege escalations. Everlasting disablement follows by deleting protected information or registry entries post-callback removing, surviving reboots. Killing is easy as soon as object protections vanish.​

Demos present, for instance, terminating AV processes by way of Activity Supervisor and erasing self-protected information, as depicted in repository pictures of command outputs and before-and-after states.​

Whereas supposed for moral analysis, RealBlindingEDR’s simplicity, requiring solely a signed driver and admin rights, poses dangers for purple teaming and real-world threats.

Ransomware operators like Crypto24 have built-in it into multi-stage assaults, impairing defenses earlier than encryption. Organizations ought to monitor for susceptible driver hundreds and kernel anomalies utilizing superior EDR with behavioral analytics.​

Microsoft and AV distributors urge driver signature enforcement and instruments like Driver Signature Enforcement Overrider mitigations. Future updates might goal ETW suppliers and WFP callbacks, escalating kernel-level evasion ways.

Safety groups are suggested to evaluation endpoint logs for uncommon sys file accesses and prioritize least-privilege driver utilization.​

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AVEDR, Callbacks, Kernel, Permanently, RealBlindingEDR, Tool, Turn

Post navigation

Previous Post: SonicWall SSLVPN Under Attack Following the Breach of All Customers’ Firewall Backups
Next Post: New Rust-Based Malware “ChaosBot” Uses Discord Channels to Control Victims’ PCs

Related Posts

Sophisticated Malware Campaign Targets WordPress and WooCommerce Sites with Obfuscated Skimmers Cyber Security News
Developing Collaborative Threat Intelligence Sharing Frameworks Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
Sidewinder APT Hackers Leverage Nepal Protests to Push Mobile and Windows Malware Cyber Security News
Hackers Compromise Active Directory to Steal NTDS.dit that Leads to Full Domain Compromise Cyber Security News
UAC-0099 Hackers Weaponizing HTA Files to Deliver MATCHBOIL Loader Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets
  • Asahi Data Breach Impacts 2 Million Individuals
  • Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
  • Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • One Identity Safeguard Named a Visionary in the 2025 Gartner Magic Quadrant for PAM
  • Shai Hulud v2 Exploits GitHub Actions Workflows as Attack Vector to Steal Secrets
  • Asahi Data Breach Impacts 2 Million Individuals
  • Microsoft to Block Unauthorized Scripts in Entra ID Logins with 2026 CSP Update
  • Qilin RaaS Exposed 1 Million Files and 2 TB of Data Linked to Korean MSP Breach

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark