Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files

New EDR-Redir V2 Blinds Windows Defender on Windows 11 With Fake Program Files

Posted on November 2, 2025November 2, 2025 By CWS

An upgraded launch of software EDR-Redir V2, designed to evade Endpoint Detection and Response (EDR) techniques by exploiting Home windows bind hyperlink expertise in a novel approach.

In keeping with the researcher TwoSevenOneT, the model targets the father or mother directories of EDR installations, akin to Program Information, to create redirection loops that blind safety software program with out disrupting authentic functions.

Beforehand, EDR-Redir used direct folder redirections, however protections typically blocked these makes an attempt; V2 circumvents this by looping subfolders again to themselves whereas isolating the EDR’s path for manipulation.​

The software builds on Home windows’ bind hyperlink function, launched in Home windows 11 24H2, which permits filesystem namespace redirection by way of the bindflt.sys driver with out kernel privileges.

EDR options like antivirus packages usually lock down their subfolders in places akin to Program Information or ProgramData to stop tampering, however they can’t absolutely prohibit writes to father or mother directories with out breaking system installations.

EDR-Redir V2 queries all subfolders within the goal father or mother, like Program Information, and mirrors them in a managed listing, akin to C:TMPTEMPDIR. It then establishes bidirectional bind hyperlinks between these mirrors and originals, forming loops that preserve regular entry for non-EDR software program.

The EDR’s particular subfolder, akin to Home windows Defender’s in C:ProgramDataMicrosoft, is excluded from the loop and redirected solely to the attacker’s TEMPDIR.

This setup permits DLL hijacking or file drops within the redirected area, tricking the EDR into loading malicious parts. Builders typically overlook such parent-level redirections, probably affecting a variety of EDRs.​

EDR-Redir V2 on Home windows Defender

In an illustration on Home windows 11, TwoSevenOneT utilized EDR-Redir V2 in opposition to Home windows Defender, positioned in C:ProgramDataMicrosoftWindows Defender.

The software was executed with parameters specifying the goal folder, redirection vacation spot, and exception path: EDR-Redir.exe C:ProgramDataMicrosoft c:TMPTEMPDIR “C:ProgramDataMicrosoftWindows Defender”.

Console output detailed the bind hyperlink creations, confirming success with out errors. Submit-execution, Defender’s entry makes an attempt looped via TEMPDIR, successfully blinding it to its authentic information and permitting potential evasion techniques.

A visualization confirmed the redirection in motion, with Defender viewing TEMPDIR as its operational father or mother. The GitHub repository for EDR-Redir supplies the software for obtain and additional testing. A demo video on YouTube illustrates the method in real-time.​

This system highlights vulnerabilities in how EDRs shield in opposition to filesystem manipulations on the father or mother stage, rendering folder-specific safeguards ineffective. Attackers may disable EDR providers or inject code, working undetected in consumer mode with minimal occasions.

Whereas no widespread exploits are reported but, the tactic’s simplicity raises considerations for enterprise environments. Defenders ought to monitor bind hyperlink utilization in crucial directories like Program Information and implement integrity checks on EDR paths.

EDR distributors might have to boost protections for father or mother folders with out impeding usability. TwoSevenOneT shares ongoing analysis on X (@TwoSevenOneT) for pentesting insights. As evasion instruments evolve, proactive monitoring of kernel filters stays important.​

Comply with us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Blinds, Defender, EDRRedir, Fake, Files, Program, Windows

Post navigation

Previous Post: OpenAI’s New Aardvark GPT-5 Agent that Detects and Fixes Vulnerabilities Automatically
Next Post: Cybersecurity News Weekly Newsletter – EY Data Leak, Bind 9, Chrome Vulnerability, and Aardvar Agent

Related Posts

New Phishing Attack Mimics Google AppSheet to Steal Login Credentials New Phishing Attack Mimics Google AppSheet to Steal Login Credentials Cyber Security News
Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Pentest Copilot – AI-based Ethical Hacking Tool to Streamline Penetration Testing Cyber Security News
DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs DPRK IT Workers Using Code-Sharing Platforms to Secure New Remote Jobs Cyber Security News
IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files IBM QRadar Vulnerabilities Let Attackers Access Sensitive Configuration Files Cyber Security News
VMware vCenter and NSX Vulnerabilities Let Attackers Enumerate Valid Usernames VMware vCenter and NSX Vulnerabilities Let Attackers Enumerate Valid Usernames Cyber Security News
CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday CISA Releases Emergency Advisory Urges Feds to Patch Exchange Server Vulnerability by Monday Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News