Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR

New GhostLocker Tool that Uses Windows AppLocker to Neutralize and Control EDR

Posted on December 23, 2025December 23, 2025 By CWS

A brand new instrument named GhostLocker has been launched, demonstrating a novel approach to neutralize Endpoint Detection and Response (EDR) techniques by weaponizing the native Home windows AppLocker function.

Developed by safety researcher zero2504, the instrument highlights a elementary architectural vulnerability in fashionable EDR options: their reliance on userland parts for evaluation and reporting.​

In contrast to conventional EDR bypasses that try to take advantage of kernel drivers or carry out advanced reminiscence manipulation, GhostLocker leverages the inherent authority granted to system directors. The instrument makes use of AppLocker, Microsoft’s utility whitelisting framework launched in Home windows 7, to implement “Deny” guidelines towards EDR executables.​

The idea is easy however efficient: directors have the respectable energy to manage software program execution. GhostLocker automates this by deploying insurance policies that explicitly block EDR processes from launching or restarting.

The instrument presents two modes of operation: a dynamic model that enumerates operating processes to generate exact guidelines, and a static model that makes use of wildcard paths (e.g., *MsMpEng.exe) to dam targets with out prior enumeration.

​The analysis behind GhostLocker reveals that whereas AppLocker can not terminate already operating processes, a easy reboot after coverage utility renders the EDR ineffective.

Crucially, the instrument doesn’t block the EDR’s kernel drivers (*.sys). These drivers proceed to load, register callbacks, and acquire telemetry.​

Nonetheless, the analysis findings present that this telemetry turns into ineffective with out the corresponding userland providers. Trendy EDRs depend on user-mode parts to correlate occasions, carry out behavioral evaluation, and ship alerts to the cloud. When these userland “brains” are blocked by AppLocker, the EDR is successfully blinded, though its kernel “eyes” are nonetheless open.​

Throughout in depth testing towards business EDR merchandise, GhostLocker achieved full neutralization. Regardless of the blocking, administration consoles continued to report the brokers as “on-line” and “protected,” because the heartbeat mechanisms have been typically decoupled from the evaluation engines. Moreover, beforehand detected injection assaults went unnoticed as a result of the behavioral evaluation engines couldn’t execute.​

The instrument additionally demonstrates a definite benefit over Home windows Defender Software Management (WDAC) assaults. Whereas WDAC operates on the kernel stage to dam drivers, AppLocker insurance policies are strictly userland, making them simpler to deploy for focused blocking whereas sustaining the looks of a functioning system.​

The discharge emphasizes that this isn’t an exploit, however an abuse of respectable options. To defend towards this, organizations are suggested to observe for AppLocker coverage modifications by way of AppID.sys IOCTL alerts and to make sure their safety merchandise make the most of the Get-AppLockerFileInformation API to pre-validate their very own execution standing.​

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:AppLocker, Control, EDR, GhostLocker, Neutralize, Tool, Windows

Post navigation

Previous Post: 574 Arrested, $3 Million Seized in Crackdown on African Cybercrime Rings
Next Post: Italy Antitrust Agency Fines Apple $116 Million Over Privacy Feature; Apple Announces Appeal

Related Posts

Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Multiple Schneider Electric Vulnerabilities Let Attackers Inject OS Commands Cyber Security News
Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security Microsoft Unveils Hardware-Accelerated BitLocker to Enhance Performance and Security Cyber Security News
Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Samsung MagicINFO 9 Server Vulnerability Let Attackers Write Arbitrary File Cyber Security News
Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Critical Solarwinds Web Vulnerability Allows Remote Code Execution and Security Bypass Cyber Security News
The Rise of Subscription-Based Cybercrime The Rise of Subscription-Based Cybercrime Cyber Security News
Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore Criminal IP to Showcase ASM and CTI Innovations at GovWare 2025 in Singapore Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News