Imagine antivirus software suddenly stops running. That would be frightening, right? This is precisely what a new tool called
EDR Freeze can do. It performs some unexpected actions by using a component of
Windows Error Reporting (WER). When I read about it, I thought, "Wow, you'll be able to do some horrible things with this tool, especially if you are a hacker!"
What the heck is EDR Freeze?
EDR Freeze serves as a proof-of-concept tool. This signifies that it demonstrates a technique to obtain anything that you desire but is not something that attackers are currently using in a direct or public manner.
Here is the key idea:
- It has the ability to suspend antivirus or security products without the need for special system-level access.
- It takes advantage of a Windows component called "WerFaultSecure," which is typically used for error reporting.
- It also uses a function called MiniDumpWriteDump, which creates snapshots of programs for debugging. This momentarily suspends all threads in the target program.
How EDR Freeze Functions (Simplified Version)
- Initiate WerFaultSecure, which runs with elevated system privileges.
- Direct it to invoke MiniDumpWriteDump against the target security program.
- The security program will be frozen while the dump is written to disk.
- Freeze WerFaultSecure, so that the original program never resumes.
- Therefore, the security program remains frozen.
This method was executed with success on
Windows 11, even with
Microsoft Defender frozen.
Why This Is A Concern
Here’s what that means:
- The attack is conducted entirely in user mode which means no complex kernel hacks needed.
- It utilizes built-in Windows functionality, so it is less likely that the antivirus will detect it.
- Most traditional attacks rely on the use of risky types of exploitation through drivers with vulnerabilities. Therefore, it's an easier method to perform.
In other words, an attacker could simply freeze your protection while remaining undetected.
What Can Be Done
Here are some suggestions for prevention:
- Be aware of call-outs to WER targeting any antivirus.
- Restrict MiniDumpWriteDump to security personnel only.
- Microsoft may need to update Windows so these utility tools can't be misused or abused.
My Thoughts
I think it's neat, but dangerous. Researchers are demonstrating this to better prepare security teams before attackers use it for real on targets.
This is one of those "wow, that's possible?" moments. If you have an antivirus package or
EDR, this provides just another way we need to stay updated and monitor unusual Windows activity.