New ‘BlackSanta’ EDR killer spotted targeting HR departments
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读这篇文章,了解主要信息。 文章讲的是一个俄罗斯语的威胁行为者攻击人力资源部门,使用了恶意软件BlackSanta。这个恶意软件结合了社会工程和高级规避技术,目的是窃取敏感信息。攻击方式可能是通过鱼叉式网络钓鱼邮件分发ISO文件,里面包含恶意代码。恶意软件会进行系统指纹识别、环境检查,并下载额外的payload。BlackSanta的主要功能是终止安全进程,禁用安全工具,并修改注册表来减少 telemetry。 我需要把这些关键点浓缩到100字以内。首先提到威胁行为者和目标部门,然后是使用的恶意软件和攻击手法,最后是BlackSanta的功能。 可能的结构是:俄罗斯语威胁行为者针对HR部门,使用BlackSanta恶意软件结合社会工程和高级技术窃取信息。攻击通过鱼叉式钓鱼邮件分发ISO文件,执行恶意代码并下载payload。BlackSanta终止安全进程并禁用工具。 这样应该能控制在100字左右,并且涵盖主要信息。 </think> 俄罗斯语威胁行为者针对人力资源部门发起攻击,利用名为BlackSanta的恶意软件结合社会工程和高级技术窃取敏感信息。攻击通过鱼叉式网络钓鱼邮件分发伪装成简历的ISO文件,执行恶意代码并下载额外payload。BlackSanta可终止安全进程、禁用安全工具并修改系统设置以削弱防护能力。 2026-3-10 23:0:18 Author: www.bleepingcomputer.com(查看原文) 阅读量:5 收藏

New ‘BlackSanta’ EDR killer spotted targeting HR departments

For more than a year, a Russian-speaking threat actor targeted human resource (HR) departments with malware that delivers a new EDR killer named BlackSanta.

Described as "sophisticated," the campaign mixes social engineering with advanced evasion techniques to steal sensitive information from compromised systems.

It is unclear how the attack begins, but researchers at Aryaka, a network and security solutions provider, suspect that the malware is distributed via spear-phishing emails.

They believe that targets are directed to download ISO image files that appear as resumes and are hosted on cloud storage services, such as Dropbox.

One malicious ISO analyzed contained four files: a Windows shortcut (.LNK) disguised as a PDF file, a PowerShell script, an image, and a .ICO file.

ISO file contents
ISO file contents
Source: Aryaka

The shortcut launches PowerShell and executes the script, which extracts data hidden in the image file using steganography and executes it in system memory.

The code also downloads a ZIP archive containing a legitimate SumatraPDF executable and a malicious DLL (DWrite.dll) to load using the DLL sideloading technique.

Decrypted PowerShell script
Decrypted PowerShell script
Source: Aryaka

The malware performs system fingerprinting and sends the information to the command-and-control (C2) server, and then performs extensive environment checks to stop execution if sandboxes, virtual machines, or debugging tools are detected.

It also modifies Windows Defender settings to weaken security at the host, performs disk-write tests, and then downloads additional payloads from the C2, which are executed via process hollowing, inside legitimate processes.

BlackSanta EDR killer

A key component delivered in the campaign is an executable identified as the BlackSanta EDR killer, a module that silences endpoint security solutions before deploying malicious payloads.

BlackSanta adds Microsoft Defender exclusions for ‘.dls’ and ‘.sys’ files, and modifies a Registry value to reduce telemetry and automatic sample submission to Microsoft security cloud endpoints.

The researchers' report (PDF) notes that BlackSanta can also suppress Windows notifications to minimize or completely silence user alerts. The core function of BlackSanta is to terminate security processes, which it does by:

  1. enumerating running processes
  2. comparing the names against a large hardcoded list of antivirus, EDR, SIEM, and forensic tools
  3. retrieving the matching process IDs
  4. using the loaded drivers to unlock and terminate those processes at the kernel level
Part of the hardcoded list
Part of the hardcoded list
Source: Aryaka

Aryaka did not share details about the target organizations or the threat actors behind the campaign, and couldn’t retrieve the final payload used in the observed case, as the C2 server was unavailable at the time of their examination.

The researchers were able to identify additional infrastructure used by the same threat actor and discovered multiple IP addresses related to the same campaign. This is how they learned that the operation had been running unnoticed for the past year.

Looking at the IP addresses, the researchers uncovered that the malware also downloaded Bring Your Own Driver (BYOD) components that included the RogueKiller Antirootkit driver v3.1.0 from Adlice Software, and IObitUnlocker.sys v1.2.0.1 from IObit.

These drivers have been used in malware operations (12) to gain elevated privileges on the compromised machine and suppress security tools.

RogueKiller (truesight.sys) allows manipulation of kernel hooks and memory monitoring, while IObitUnlocker.sys allows bypassing file and process locks. This combination provides the malware with low-level access to system memory and processes.

Aryaka researchers say the threat actor behind the campaign shows strong operational security and uses context-aware, stealthy infection chains to deploy components such as BlackSanta EDR.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/new-blacksanta-edr-killer-spotted-targeting-hr-departments/
如有侵权请联系:admin#unsafe.sh