EvilEDR: Repurposing EDR as an Offensive Tool

Conference Paper (2025)
Author(s)

Kotaiba Alachkar (TU Delft - Organisation & Governance)

Dirk Gaastra

Eduardo Barbaro (TU Delft - Organisation & Governance)

Michel van Eeten (TU Delft - Organisation & Governance)

Yury Zhauniarovich (TU Delft - Organisation & Governance)

DOI related publication
https://doi.org/10.5555/3766078.3766109 Final published version
More Info
expand_more
Publication Year
2025
Language
English
Pages (from-to)
587-606
Publisher
USENIX Association
ISBN (print)
978-1-939133-52-6
Event
Downloads counter
94
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Endpoint Detection and Response (EDR) systems provide continuous monitoring, threat detection, and response capabilities. This has driven their widespread adoption in enterprises, making them a key part of an enterprise's security architecture. However, EDR systems are a double-edged sword, and in this study, we demonstrate how this class of systems can be employed for offensive use. Unlike prior studies that focused on evasion and tampering, we introduce the new concept of EDR repurposing, which we call EvilEDR. Our analysis shows that EvilEDR can be used to execute arbitrary commands via the response console, transfer tools, exfiltrate data, and passively collect system information to facilitate further exploitation and lateral movement. EvilEDR operates covertly, masquerading as a legitimate process and communicating seamlessly with trusted domains. Additionally, we show that EvilEDR can impair defenses by registering its own EPP as the default. It can also isolate the host from the network, severing telemetry and response channels essential for enterprise defense mechanisms. Fortunately, EvilEDR can be effectively detected and mitigated, and in this paper, we propose concrete and actionable defense strategies to achieve this.

Files

License info not available