No Last Name Needed
  • Communities
  • Create Post
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
atrielienz@lemmy.world to Technology@lemmy.worldEnglish ·
edit-2
1 年前

Windows Defender Anti-virus Bypassed Using Direct Syscalls & XOR Encryption

cybersecuritynews.com

external-link
message-square
24
link
fedilink
101
external-link

Windows Defender Anti-virus Bypassed Using Direct Syscalls & XOR Encryption

cybersecuritynews.com

atrielienz@lemmy.world to Technology@lemmy.worldEnglish ·
edit-2
1 年前
message-square
24
link
fedilink
Windows Defender Antivirus Bypassed Using Direct Syscalls & XOR Encryption
cybersecuritynews.com
external-link
A new sophisticated method to bypass Microsoft's Windows Defender antivirus protection by combining direct syscalls with XOR encryption techniques.

“According to the research published by Hackmosphere, the technique works by avoiding the conventional execution path where applications call Windows API functions through libraries like kernel32.dll, which then forwards requests to ntdll.dll before making the actual system call to the kernel.”

Additional Information:

https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-1/

https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-2/

alert-triangle
You must log in or # to comment.
  • Encephalotrocity@biglemmowski.win
    link
    fedilink
    English
    arrow-up
    26
    ·
    1 年前

    They also suggest organizations deploy additional security layers beyond Windows Defender, particularly solutions that can monitor behavior at the kernel level.

    Anything like this for the typical home user?

    • 0x0@lemmy.zip
      link
      fedilink
      English
      arrow-up
      33
      arrow-down
      1
      ·
      1 年前

      Sure, bring back Crowdstrike, that went well…

      Btw I wasn’t aware XOR was encrytion…

      • Neverclear@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        21
        ·
        1 年前

        XOR cleartext once with a key you get ciphertext. XOR the ciphertext with the same key you get the original cleartext. At its core this is the way the old DES cipher works.

        A bit of useful trivia: If you XOR any number with itself, you get all zeros. You can see this in practice when an assembly programmer XOR’s a register with itself to clear it out.

        • Quazatron@lemmy.world
          link
          fedilink
          English
          arrow-up
          14
          ·
          1 年前

          That’s how it was done in the old days to save a few cycles in Z80 assembly. XOR A instead of LD A, 0.

          • InverseParallax@lemmy.world
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 年前

            I use that daily in my accelerator work.

            Once you learn the trick, you just use it naturally.

        • PetteriPano@lemmy.world
          link
          fedilink
          English
          arrow-up
          5
          ·
          1 年前

          Apple had this undocumented function for screenshotting back on iOS 3.1, and kind of let you use it while waiting for better frameworks in iOS 4.0

          At some point they started rejecting your app automatically if they found the symbol for that function in your app. I didn’t want to leave my 3.1 users in the dust for no reason, so I did the same trick to obfuscate the symbol name before dynamically linking it in.

          It worked right up until they stopped supporting iOS 3.1 completely.

        • Malfeasant@lemm.ee
          link
          fedilink
          English
          arrow-up
          6
          arrow-down
          2
          ·
          1 年前

          an x86 assembly programmer

          Ftfy. not all CPUs have an xor register with itself instruction.

          • Q*Bert Reynolds@sh.itjust.works
            link
            fedilink
            English
            arrow-up
            4
            ·
            1 年前

            There are a lot more architectures than just x86 that are capable of XORing a register with itself (ie. ARM and RISC-V), and if you took OP to mean the accumulation register specifically, pretty much all CPUs going back as far as I can think have had that functionality.

            • Malfeasant@lemm.ee
              link
              fedilink
              English
              arrow-up
              2
              arrow-down
              2
              ·
              1 年前

              Yes, but it’s not universal that xoring a register with itself is more performant than simply loading it with 0.

              • Q*Bert Reynolds@sh.itjust.works
                link
                fedilink
                English
                arrow-up
                3
                ·
                1 年前

                I never made that claim, nor did the person you corrected.

                • Malfeasant@lemm.ee
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  arrow-down
                  1
                  ·
                  1 年前

                  Yes, but that’s why x86 assembly programmers do it…

      • heavydust@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        12
        ·
        1 年前

        https://en.wikipedia.org/wiki/One_time_pad

        XOR may be the only encryption system that cannot be cracked. The length of the key is a PITA though.

      • atrielienz@lemmy.worldOP
        link
        fedilink
        English
        arrow-up
        6
        ·
        1 年前

        It technically counts. It’s a cipher that uses the same key for encryption and decryption.

        • Quazatron@lemmy.world
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 年前

          A one time pad, I think it called.

          • ignirtoq@fedia.io
            link
            fedilink
            arrow-up
            1
            ·
            1 年前

            deleted by creator

      • Zwuzelmaus@feddit.org
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        1 年前

        Btw I wasn’t aware XOR was encrytion…

        It’s even better than ROT13, because you always need to apply ROT13 twice for getting the good results…

  • ilmagico@lemmy.world
    link
    fedilink
    English
    arrow-up
    14
    ·
    1 年前

    According to the research published by Hackmosphere, […]

    I cannot find a link to the original research, anybody has the link to the original research?

    • atrielienz@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      11
      ·
      1 年前

      https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-1/

      https://www.hackmosphere.fr/bypass-windows-defender-antivirus-2025-part-2/

      This is what I could find.

  • mbirth 🇬🇧@lemmy.ml
    link
    fedilink
    English
    arrow-up
    10
    ·
    1 年前

    Wasn’t there something a few months ago about Microsoft handing out secret API calls to developers of other antivirus products so they can quietly disable Defender during the installation of their product? Some guy had this reverse engineered from an installer…

    • Brkdncr@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 年前

      It’s not a secret. It’s a regkey. You need privs to do it though.

  • MonkderVierte@lemmy.ml
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 年前

    That Vitus must be pretty bad.

    • atrielienz@lemmy.worldOP
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 年前

      Thanks! Fixed!

  • Buelldozer@lemmy.today
    link
    fedilink
    English
    arrow-up
    3
    ·
    1 年前

    Saw this attack in the wild this week. Huntress MDR detected and shut it down.

Technology@lemmy.world

technology@lemmy.world

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !technology@lemmy.world

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


  • @L4s@lemmy.world
  • @autotldr@lemmings.world
  • @PipedLinkBot@feddit.rocks
  • @wikibot@lemmy.world
Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 6.93K users / day
  • 10.3K users / week
  • 15.9K users / month
  • 31.1K users / 6 months
  • 3 local subscribers
  • 84.5K subscribers
  • 19.3K Posts
  • 856K Comments
  • Modlog
  • mods:
  • L3s@lemmy.world
  • enu@lemmy.world
  • Technopagan@lemmy.world
  • L4sBot@lemmy.worldB
  • L3s@hackingne.ws
  • BE: 0.19.18
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org