Akira ransomware abuses CPU tuning tool to disable Microsoft Defender

Andy Ful

From Hard_Configurator Tools
Thread author
Verified
Honorary Member
Top Poster
Developer
Well-known
Forum Veteran
Dec 23, 2014
10,132
1
67,163
8,398
65
Poland
Akira ransomware abuses CPU tuning tool to disable Microsoft Defender


The title is slightly provocative because it refers to the article that tells us slightly different things:

However, based on several GuidePoint Incident Response cases in recent months, we have detected the repeated use of two Windows drivers by Akira affiliates. These drivers have almost certainly been used to facilitate AV/EDR evasion or disablement through a Bring Your Own Vulnerable Driver (BYOVD) exploitation chain.

Next, the authors explain some details on the malware example related to Microsoft Defender. As in many other articles, the attack can hardly happen against home users.
The method noted in the article (disabling Microsoft Defender via DisableAntiSpyware settings of Windows Defender) is protected by tamper protection, which is available in all editions of Windows 10, version 1903 and later.
The attack also uses the legitimate driver (ThrottleStop) to load the malicious driver as a service. Such attacks are blocked when Core Isolation settings are enabled.

Anyway, the attacks can impact many Enterprises that use older Windows versions.