Thursday, April 17, 2025
Homecyber securitySilent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

Silent Killers Exploit Windows Policy Loophole to Evade Detections and Deploy Malware

Published on

SIEM as a Service

Follow Us on Google News

In a significant cybersecurity revelation, researchers have uncovered a large-scale campaign exploiting a Windows policy loophole to deploy malware while evading detection.

The attack hinges on the abuse of a legacy driver, Truesight.sys (version 2.0.2), which contains vulnerabilities that allow attackers to bypass modern security measures.

This driver, part of Adlice’s RogueKiller Antirootkit suite, has been exploited in over 2,500 distinct variants, each digitally signed to avoid detection mechanisms.

- Advertisement - Google News

The campaign, active since mid-2024, leverages the exception in Microsoft’s driver signing policy that permits older drivers signed before July 29, 2015, to load on the latest Windows versions.

By exploiting this loophole, attackers bypassed Microsoft’s Vulnerable Driver Blocklist and other detection systems like LOLDrivers.

One of the detected samples dropping the legacy Truesight driver, version 2.0.2.

The Truesight driver version 2.0.2 was specifically chosen as it retains exploitable code while evading blocklist attributes applied to newer driver versions.

To further obfuscate their activities, attackers modified specific parts of the Portable Executable (PE) file structure of the driver, altering checksum fields and padding bytes without invalidating its digital signature.

This technique enabled the generation of thousands of unique file hashes for the same driver, effectively neutralizing hash-based detection systems.

VT search – specific system path used by some of the detected samples to drop the Truesight driver.

Multi-Stage Infection Chain and Advanced Techniques

Initial-stage malware samples masquerade as legitimate applications and are distributed via phishing campaigns involving deceptive websites and messaging app channels.

These samples act as downloaders for subsequent payloads, including the EDR/AV killer module designed to disable endpoint security solutions by exploiting the Truesight.sys vulnerability.

The EDR/AV killer module communicates with the vulnerable driver using a custom IOCTL code (0x22E044) to terminate processes associated with security tools running as protected processes (PP/PPL).

According to the Check Point Research, this enables attackers to disable critical defenses before deploying final-stage payloads such as Gh0st RAT a powerful remote access trojan capable of data theft and system control.

The campaign’s infrastructure is hosted primarily in public cloud regions in China, with approximately 75% of victims located in China and others spread across Asia.

The attackers’ use of advanced techniques such as DLL side-loading, encrypted payloads disguised as image files (e.g., PNG or JPG), and commercial protectors like VMProtect underscores their sophistication and intent to evade detection for extended periods.

Microsoft Responds with Updated Blocklist

Following reports from researchers, Microsoft updated its Vulnerable Driver Blocklist on December 17, 2024, to include all variants of the exploited Truesight driver.

However, organizations are advised to manually apply these updates as they are not auto-deployed frequently.

This campaign highlights critical gaps in traditional detection methods like hash-based systems and emphasizes the need for proactive hunting rules targeting unknown vulnerabilities.

It also underscores the importance of robust security mechanisms like Microsoft’s blocklist that rely on multi-attribute detection rather than simple hash matching.

The discovery serves as a stark reminder for defenders to stay vigilant against evolving threats that exploit overlooked vulnerabilities in legacy systems while leveraging sophisticated evasion techniques.

Free Webinar: Better SOC with Interactive Malware Sandbox for Incident Response, and Threat Hunting - Register Here

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...

Microsoft Vulnerabilities Reach Record High with Over 1,300 Reported in 2024

The 12th Edition of the Microsoft Vulnerabilities Report has revealed a significant surge in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Ransomware Attacks Surge 126%, Targeting Consumer Goods and Services Sector

The cybersecurity landscape witnessed a dramatic escalation in ransomware attacks, marking a concerning trend...

CrazyHunter Hacker Group Exploits Open-Source GitHub Tools to Target Organizations

A relatively new ransomware outfit known as CrazyHunter has emerged as a significant threat,...

Threat Actors Leverage Cascading Shadows Attack Chain to Evade Detection and Hinder Analysis

A sophisticated multi-layered phishing campaign was uncovered, employing a complex attack chain known as...