Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads

Posted on July 5, 2025July 5, 2025 By CWS

Cybersecurity researchers have uncovered a regarding improvement as malicious actors started exploiting SHELLTER, a industrial anti-virus and endpoint detection response (EDR) evasion framework, to deploy refined malware payloads.

Initially designed for professional penetration testing operations, this framework has been weaponized by cybercriminals since late April 2025, marking a major escalation in evasion capabilities accessible to menace actors.

The illicit use of SHELLTER represents a troubling development the place professional offensive safety instruments are repurposed for malicious actions.

The industrial framework, particularly Elite model 11.0 launched on April 16, 2025, offers superior capabilities permitting malware to bypass trendy safety options by refined obfuscation and evasion methods.

Its polymorphic code era and talent to embed malicious payloads inside professional purposes have made detection considerably more difficult.

Elastic Safety Labs researchers recognized a number of financially motivated campaigns using SHELLTER-protected payloads, together with deployment of infamous info stealers akin to LUMMA, RHADAMANTHYS, and ARECHCLIENT2.

These campaigns primarily focused content material creators and gaming communities by rigorously crafted phishing emails and malicious hyperlinks distributed through YouTube feedback and file-sharing platforms like MediaFire.

All analyzed samples share a constant license expiry timestamp of 2026-04-17 19:17:24.055000, suggesting use of a single illicitly acquired license.

Exercise Timeline (Supply – Elastic)

The distribution technique demonstrates refined social engineering ways, with attackers impersonating professional manufacturers together with Udemy, Skillshare, Pinnacle Studio, and Duolingo.

SHELLTER Unpacker (Supply – Elastic)

Victims are lured into downloading malicious archive information containing SHELLTER-protected executables, usually disguised as promotional content material or software program updates.

Superior Evasion Mechanisms and Technical Implementation

The technical sophistication of SHELLTER’s evasion capabilities represents a major problem for cybersecurity professionals.

The framework employs AES-128 CBC encryption to guard remaining payloads, with encryption keys both embedded immediately inside malware or fetched from attacker-controlled servers.

This dual-key method offers flexibility whereas sustaining sturdy cryptographic safety in opposition to evaluation efforts.

SHELLTER’s most notable characteristic is its implementation of polymorphic junk code insertion, producing legitimate-looking directions that serve no useful objective apart from complicated static evaluation instruments and signature-based detection programs.

Name stack of backdoored file (Supply – Elastic)

The framework makes use of oblique syscalls and name stack corruption methods to bypass user-mode API hooking mechanisms generally employed by EDR options.

These methods contain getting ready the stack with addresses of unpolluted syscall directions from ntdll.dll and utilizing return directions to redirect execution circulate.

The framework’s reminiscence safety mechanisms additional complicate evaluation by runtime encoding and decoding of important code sections.

SHELLTER repeatedly modifies reminiscence web page permissions utilizing features like NtQueryVirtualMemory and NtProtectVirtualMemory, guaranteeing delicate code stays obfuscated when not actively executing.

This dynamic safety scheme, mixed with virtualized atmosphere detection and debugging software identification, creates a number of protection layers in opposition to safety researchers and automatic evaluation programs.

Examine reside malware habits, hint each step of an assault, and make quicker, smarter safety selections -> Strive ANY.RUN now

Cyber Security News Tags:Abused, Actors, Deploy, EDR, Evasion, Framework, InTheWild, Malware, Payloads, Threat

Post navigation

Previous Post: Police in Brazil Arrest a Suspect Over $100M Banking Hack
Next Post: The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses

Related Posts

CISA Warns of CitrixBleed 2 Vulnerability Exploited in Attacks Cyber Security News
Threat Actors Attacking Job Seekers With Three New Unique Adversaries Cyber Security News
New FileFix Attack Abuses Windows File Explorer to Execute Malicious Commands Cyber Security News
Retired US Air Force Employee Pleads Guilty for Sharing Military Secrets on a Dating App Cyber Security News
Hackers Advertising New Nytheon AI Blackhat Tool on popular Hacking Forums Cyber Security News
F5 BIG-IP Command Injection Vulnerability Let Attackers Execute Arbitrary System Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Stay Anonymous Online
  • DOM-Based Extension Clickjacking Exposes Popular Password Managers to Credential and Data Theft
  • Hackers Weaponize Active Directory Federation Services and office.com to Steal Microsoft 365 logins
  • A Free Zero Trust Web Application Firewall for 2026
  • FBI Warns FSB-Linked Hackers Exploiting Unpatched Cisco Devices for Cyber Espionage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News