Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence

Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence

Posted on January 29, 2026January 29, 2026 By CWS

Praetorian Inc. has publicly launched Swarmer, a instrument enabling low-privilege attackers to realize stealthy Home windows registry persistence by sidestepping Endpoint Detection and Response (EDR) monitoring.

Deployed operationally since February 2025, Swarmer exploits obligatory consumer profiles and the obscure Offline Registry API to switch the NTUSER hive with out triggering customary registry hooks.

Conventional registry persistence by way of HKCUSOFTWAREMicrosoftWindowsCurrentVersionRun keys is well detected. EDR instruments hook APIs like RegSetValue, logging, and flagging modifications.

Swarmer bypasses this by leveraging obligatory consumer profiles, a legacy Home windows function for enterprise profile enforcement.

In obligatory profiles, NTUSER.MAN overrides the usual NTUSER.DAT hive in %USERPROFILE% at login. Low-privilege customers can create NTUSER.MAN by copying and renaming NTUSER.DAT.

Nonetheless, enhancing the loaded hive requires customary APIs, alerting EDR. Swarmer solves this utilizing Offreg.dll, Microsoft’s Offline Registry Library, designed for offline hive manipulation throughout setup or forensics.

Microsoft warns in opposition to bypassing registry safety with Offreg, however Swarmer ignores this.

Features like ORCreateHive, OROpenHive, ORCreateKey, ORSetValue, and ORSaveHive permit full hive development with out Reg* API calls, evading Course of Monitor, ETW, and most EDR behavioral analytics, praetorian mentioned.

Swarmer Workflow and Implementation

Swarmer’s workflow is environment friendly:

Export HKCU by way of reg export or TrustedSec’s reg_query Beacon Object File (BOF) to keep away from disk artifacts.

Modify the export (e.g., add Run key entries).

Run Swarmer: swarmer.exe exported.reg NTUSER.MAN or with startup flags: swarmer.exe –startup-key “Updater” –startup-value “C:PathTopayload.exe” exported.reg NTUSER.MAN.

Drop NTUSER.MAN into %USERPROFILE%.

For C2 implants, parse BOF output instantly: swarmer.exe –bof –startup-key “Updater” –startup-value “C:PathTopayload.exe” bof_output.txt NTUSER.MAN.

Inbuilt C# for P/Invoke ease and offline use, Swarmer works as an EXE or PowerShell module:

textImport-Module ‘.swarmer.dll’
Convert-RegToHive -InputPath ‘.exported.reg’ -OutputPath ‘.NTUSER.MAN’

A workaround fixes ORCreateHive’s invalid hive output: RegLoadAppKeyW creates a base hive (non-admin), then Offreg populates it.

FeatureDetailsPlatformsWindows 10/11PrivilegesLow (user-level)EvasionNo Reg* APIs; non-obligatory no-disk BOFPayload TypesRun keys, customized registry mods

Limitations and Detection Alternatives

Swarmer has caveats:

CaveatImpactOne-shotCan’t replace with out admin; profile turns into obligatory, resetting consumer adjustments.Login-requiredActivates solely on logout/login; survives reboots.HKCU-onlyNo HKLM entry.Edge casesPossible login corruption; take a look at first.

Detection contains NTUSER.MAN creation outdoors enterprise instruments, Offreg.dll hundreds in non-standard processes, or profile anomalies. Payload execution at login stays seen obfuscate it.

Defenders ought to monitor consumer profile directories for NTUSER.MAN, baseline Offreg utilization, and profile integrity at login. Swarmer highlights Home windows’ legacy cruft predating trendy EDR.

This disclosure arms blue groups in opposition to obscure persistence, urging scrutiny of Home windows’ dusty corners.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:EDR, Evading, Modification, Persistence, Registry, Stealthy, Swarmer, Tool, Windows

Post navigation

Previous Post: New Semantic Chaining Jailbreak Attack Bypasses Grok 4 and Gemini Nano Security Filters
Next Post: Google Disrupts IPIDEA — One of the World’s Largest Residential Proxy Networks

Related Posts

Microsoft Details Scattered Spider TTPs Observed in Recent Attack Chains Microsoft Details Scattered Spider TTPs Observed in Recent Attack Chains Cyber Security News
Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild Cisco IOS 0-Day RCE Vulnerability Actively Exploited in the Wild Cyber Security News
Ivanti DSM Vulnerability: Critical Security Update Released Ivanti DSM Vulnerability: Critical Security Update Released Cyber Security News
Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Atomic macOS Stealer Comes With New Backdoor to Enable Remote Access Cyber Security News
MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors MuddyWater-Style Cyber Attack Targets Middle Eastern Sectors Cyber Security News
Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Threat Actors Abuse Adtech Companies to Target Users With Malicious Ads Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark