Home Cyber Security News Hackers Exploit PowerShell to Evade Antivirus and EDR Protections

Hackers Exploit PowerShell to Evade Antivirus and EDR Protections

0

Cybersecurity researchers have uncovered a recent wave of attacks in which threat actors are leveraging Microsoft PowerShell to stealthily bypass both traditional antivirus (AV) and advanced Endpoint Detection and Response (EDR) solutions.

The attackers’ approach demonstrates the increasing prevalence and sophistication of so called “living-off-the-land” techniques, which rely on native system utilities to carry out malicious actions while blending seamlessly with legitimate processes.

Attackers Leverage Living-off-the-Land Techniques

The attackers employ highly obfuscated PowerShell scripts that are executed directly in memory, thereby minimizing their footprint on disk and evading signature-based detection mechanisms.

Attack Flow

According to the Report, these PowerShell payloads are often delivered via spear-phishing emails, malicious macros, or weaponized documents that exploit unpatched vulnerabilities in commonly used software.

Once executed, the scripts utilize advanced obfuscation strategies, including dynamic variable naming, encoding, and heavy use of built-in PowerShell cmdlets for decoding and execution.

This complexity makes static and heuristic analysis by AV and EDR tools significantly more challenging.

The attackers further complicate detection by leveraging “fileless” malware payloads, executing all actions in system memory, and avoiding the creation of traditional artifacts that would normally trigger security alerts.

Researchers have observed the adversaries using PowerShell to download and execute secondary payloads, establish persistence, and exfiltrate sensitive information to remote command-and-control (C2) servers.

Notably, the malicious scripts often invoke Windows Management Instrumentation (WMI), scheduled tasks, or registry modifications to ensure ongoing access even after system reboots.

 Access User Camera

This persistence, combined with lateral movement capabilities, enables attackers to silently expand their foothold within targeted networks.

Obfuscation Bypasses Security Controls

These campaigns are notable for their ability to bypass leading EDR solutions.

Attackers are leveraging newly discovered techniques to disable security telemetry or tamper with agent processes, further reducing the likelihood of detection.

In some cases, attackers employ “AMSI bypass” methods specifically targeting the Antimalware Scan Interface (AMSI) which is designed by Microsoft to assist antivirus and EDR products in scanning scripts in real time.

By patching or disabling AMSI functions at runtime, malicious scripts can evade thorough inspection.

Security experts emphasize that these attacks highlight the critical need for a defense-in-depth approach that includes behavioral analytics, continuous monitoring, and robust endpoint hardening.

Organizations are advised to restrict PowerShell execution through Group Policy, enforce code signing, and leverage application whitelisting.

Security teams should also monitor for anomalous PowerShell activity, such as unusual process chains, unexpected network connections, and large volumes of outbound data.

Given the ongoing evolution of attacker tactics-particularly the abuse of trusted Windows components cybersecurity defenders must remain vigilant and continuously adapt their detection and response strategies.

Close collaboration between blue teams, threat hunters, and incident responders is essential to counteract this rapidly developing threat landscape.

Indicators of Compromise (IOCs)

TypeIndicatorDescription
File Hashe5b6a1c2f9d3a6ef7c3b1a2d4e1f2b5cObfuscated PowerShell script payload
Command Linepowershell -nop -w hidden -enc ...Encoded PowerShell command for fileless attack
Domainmalicious-c2[.]example[.]comC2 server used for data exfiltration
IP Address185.220.101.35Known malicious endpoint linked to campaign
Registry KeyHKCU\Software\Microsoft\Windows\Run\UpdaterPersistence mechanism registry entry
Scheduled Task\Windows\UpdateTaskMalicious scheduled task for script execution
User-Agent StringMozilla/5.0 (PowerShell)Unusual user-agent observed in C2 communication

Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant updates

NO COMMENTS

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Exit mobile version