Sunday , September 21 2025
EDR-Freeze

EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

A new proof-of-concept tool named EDR-Freeze has been developed, capable of placing Endpoint Detection and Response (EDR) and antivirus solutions into a suspended “coma” state.

Zero Salarium’s technique uses a built-in Windows feature, providing a stealthy option compared to the rising trend of Bring Your Own Vulnerable Driver (BYOVD) attacks that hackers employ to turn off security software.

EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

A new proof-of-concept tool named EDR-Freeze has been developed, capable of placing Endpoint Detection and Response (EDR) and antivirus solutions...
Read More
EDR-Freeze: A Tool That Puts EDRs And Antivirus Into A Coma State

First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

AI-driven malware called 'MalTerminal' utilizes OpenAI's GPT-4 to create harmful code like ransomware and reverse shells, indicating a major change...
Read More
First-ever AI-powered ‘MalTerminal’ Malware Uses OpenAI GPT-4 to Generate Code

Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cybersecurity researchers revealed a zero-click vulnerability in OpenAI ChatGPT's Deep Research agent that lets attackers leak sensitive Gmail inbox data...
Read More
Gmail Data exposes via ChatGPT Deep Research Agent dubbed “ShadowLeak Zero-Click” Flaw

Cyber attack disrupts several European airports: check-in and boarding systems affected

Several European airports are experiencing flight delays and cancellations due to a cyber attack on a check-in and boarding systems...
Read More
Cyber attack disrupts several European airports: check-in and boarding systems affected

Hacker claim to breach Link3; 189,000 Users data up for sale

A threat actor claims to have breached Link3, a major IT solutions and internet service provider based in Bangladesh. The...
Read More
Hacker claim to breach Link3; 189,000 Users data up for sale

Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Check point, a cyber security solutions provider hosts an event titled "securing the hyperconnected world in the AI era" at...
Read More
Check Point Hosts “Securing the Hyperconnected World in the AI Era” in Dhaka

Microsoft Confirms 900+ XSS Vulns Found in IT Services

Cross-Site Scripting (XSS) is one of the oldest and most persistent vulnerabilities in modern applications. Despite being recognized for over...
Read More
Microsoft Confirms 900+ XSS Vulns Found in IT Services

Daily Security Update Dated : 15.09.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated : 15.09.2025

IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

A critical permission misconfiguration in the IBM QRadar Security Information and Event Management (SIEM) platform could allow local privileged users...
Read More
IBM QRadar SIEM Vuln Let Attackers Perform Unauthorized Actions

Major Australian Banks using Army of AI Bots to Scam Scammers

Australian banks are now using bots to combat scammers. These bots mimic potential victims to gather real-time information and drain...
Read More
Major Australian Banks using Army of AI Bots to Scam Scammers

This method eliminates the need for third-party drivers, lowering the risk of system issues and detection. It operates entirely in user-mode, effectively and discreetly disabling security monitoring.

The MiniDumpWriteDump Exploit:

The EDR-Freeze technique mainly involves manipulating the MiniDumpWriteDump function, which is from the Windows DbgHelp library and is used to create a minidump—a memory snapshot of a process for debugging.

To ensure a consistent and uncorrupted snapshot, the function suspends all threads within the target process while the dump is created.

Ordinarily, this suspension is brief. However, the developer of EDR-Freeze devised a method to prolong this suspended state indefinitely.

EDR-Freeze Tool

The main challenges were extending the quick execution time of the MiniDumpWriteDump function and getting past the Protected Process Light (PPL) security feature that protects EDR and antivirus processes from interference.

To overcome PPL protection, the technique utilizes WerFaultSecure.exe, a component of the Windows Error Reporting (WER) service. WerFaultSecure.exe can run with WinTCB level protection, one of the highest privilege levels, allowing it to interact with protected processes.

WerFaultSecure.exe can be set to run the MiniDumpWriteDump function on any process, even those of protected EDR and antivirus software, by using the right parameters.

A race-condition attack can turn a brief pause into a lasting freeze, occurring in a quick, exact sequence:

  1. WerFaultSecure.exe is launched with parameters directing it to create a memory dump of the target EDR or antivirus process.

2. The EDR-Freeze tool continuously monitors the target process.

3. The moment the target process enters a suspended state (as MiniDumpWriteDump begins its work), the EDR-Freeze tool immediately suspends the WerFaultSecure.exe process itself.

Because WerFaultSecure.exe is now suspended, it can never complete the memory dump operation and, crucially, can never resume the threads of the target EDR process.

Zero Salarium stated that the security software remains permanently suspended and ineffective until the WerFaultSecure.exe process is ended.

EDR-Freeze Tool Killing Process:

The developer released the EDR-Freeze tool to showcase this technique. It requires two parameters: the Process ID (PID) of the target and the suspension duration in milliseconds.

An attacker can disable security tools, carry out harmful actions, and then restore security software to normal as if nothing occurred.

EDR-Freeze Tool Kills EDR and Antivirus

A test on Windows 11 24H2 successfully suspended the MsMpEng.exe process of Windows Defender.

For defenders, detecting this technique involves monitoring for unusual executions of WerFaultSecure.exe.

If the program is observed targeting the PIDs of sensitive processes like lsass.exe or EDR agents, it should be treated as a high-priority security alert requiring immediate investigation.

Source: zerosalarium, cybersecurity news

Check Also

Microsoft

Microsoft Confirms 900+ XSS Vulns Found in IT Services

Cross-Site Scripting (XSS) is one of the oldest and most persistent vulnerabilities in modern applications. …