Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    International Authorities Take Down 45,000 Malicious IPs Utilized in Ransomware Campaigns

    March 15, 2026

    The phone is 150 years outdated. It’s nonetheless altering every little thing.

    March 15, 2026

    Vulnerability For Leaders Is Not The Similar As It Is For Everybody Else

    March 15, 2026
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»EDR-Redir V2 Evades Detection on Home windows 11 by Faking Program Recordsdata
    AI Ethics & Regulation

    EDR-Redir V2 Evades Detection on Home windows 11 by Faking Program Recordsdata

    Declan MurphyBy Declan MurphyNovember 3, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    EDR-Redir V2 Evades Detection on Home windows 11 by Faking Program Recordsdata
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Safety researcher TwoSevenOneT has launched EDR-Redir V2, an upgraded evasion instrument that exploits Home windows bind hyperlink expertise to bypass endpoint detection and response options on Home windows 11.

    The brand new model demonstrates a classy strategy to redirecting safety software program by manipulating father or mother directories fairly than immediately concentrating on protected EDR folders.

    Novel Assault Methodology Targets Dad or mum Folders

    Not like the unique EDR-Redir instrument that created bind hyperlinks on to antivirus and EDR executable folders, model 2 employs a distinct technique concentrating on father or mother directories comparable to Program Recordsdata or ProgramData.

    The researcher found that whereas EDR options defend their working folders from unauthorized file writing, they can’t forestall modifications to father or mother directories with out disrupting reputable software program installations throughout the system.

    The approach creates a round bind hyperlink construction the place folders level again to themselves by an attacker-controlled non permanent listing.

    EDR-Redir V2 first queries all subfolders throughout the goal father or mother listing, then creates corresponding folders in an attacker-controlled location like C:TMPTEMPDIR.

    The instrument establishes bind hyperlinks making a loop that causes folder entry to circle again by the non permanent listing, intentionally excluding the EDR’s particular folder from this loop.

    In a proof-of-concept demonstration, the researcher efficiently redirected Home windows Defender on Home windows 11. Home windows Defender operates from C:ProgramDataMicrosoftWindows Defender, making the ProgramDataMicrosoft folder the assault goal.

    Working EDR-Redir with particular parameters efficiently pressured Home windows Defender to understand the attacker-controlled non permanent listing as its father or mother folder, enabling potential DLL hijacking assaults.

    The instrument execution requires three parameters: the folder to redirect, the goal location, and the exception folder that ought to stay unlinked.

    Throughout execution, EDR-Redir shows console details about created bind hyperlinks for monitoring functions, confirming profitable redirection of the safety software program.

    The researcher suggests this system might have an effect on quite a few antivirus and EDR options, as many builders could not anticipate father or mother directories like Program Recordsdata being redirected throughout regular operations.

    As soon as an attacker efficiently compromises the father or mother folder, EDR safety of working directories turns into ineffective.

    The approach opens pathways for DLL hijacking by permitting attackers to drop malicious executable information into the redirected non permanent listing.

    Safety groups can defend in opposition to this assault vector by implementing monitoring for bind hyperlink creation makes an attempt concentrating on crucial system folders like Program Recordsdata and ProgramData.

    The instrument is publicly out there on GitHub, elevating considerations about potential exploitation by menace actors concentrating on enterprise environments.

    Organizations operating Home windows 11 with varied EDR options ought to consider their vulnerability to father or mother folder redirection methods and implement applicable bind hyperlink monitoring controls.

    Observe us on Google Information, LinkedIn, and X to Get Immediate Updates and Set GBH as a Most popular Supply in Google.

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    International Authorities Take Down 45,000 Malicious IPs Utilized in Ransomware Campaigns

    March 15, 2026

    Cyber criminals too are working from residence… your private home

    March 15, 2026

    Iran-Linked Hacktivists Declare Harmful Cyberattack on Medtech Agency Stryker

    March 15, 2026
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    International Authorities Take Down 45,000 Malicious IPs Utilized in Ransomware Campaigns

    By Declan MurphyMarch 15, 2026

    An unprecedented worldwide regulation enforcement effort has efficiently dismantled a large cybercrime community. Coordinated by…

    The phone is 150 years outdated. It’s nonetheless altering every little thing.

    March 15, 2026

    Vulnerability For Leaders Is Not The Similar As It Is For Everybody Else

    March 15, 2026

    The 2026 Knowledge Science Starter Package: What to Be taught First (And What to Ignore)

    March 15, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2026 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.