The Poortry/BurntCigar toolkit has added more ways for it to evade detection, evolved into something akin to a rootkit. Credit: Solarseven / Shutterstock Defenders are being warned that a tool used by several ransomware gangs to sabotage the functions of endpoint protection software has been updated, with at least one attacker using a new capability to wipe endpoint detection and response (EDR) software from a victim’s IT system. Researchers at Sophos said this month they saw evidence during an investigation of an attack in July that the toolset — which has been dubbed Poortry or BurntCigar by some researchers – was used to delete EDR components completely, instead of just terminating their processes as in previous attacks. This will help clear the way for installation of ransomware. While Trend Micro last year reported Poortry had added this feature, Sophos said this was the first time the cybersecurity company had seen the EDR-killing capability used. Poortry/BurntCigar, first discovered by Mandiant, is a malicious kernel driver used in conjunction with a loader dubbed Stonestop that attempts to bypasses Microsoft Driver Signature Enforcement. Both the driver and the loader are heavily obfuscated by commercial or open-source packers, such as VMProtect, Themida or ASMGuard. The driver tries to disguise itself by using the same information in its properties sheet as a driver for a commercially available program called Internet Download Manager, by Tonec Inc.. But, Sophos said, it isn’t this software package’s driver – the attackers merely cloned the information from it. Ransomware gangs known to use Poortry include Cuba, BlackCat, Medusa, LockBit and RansomHub, Sophos says. The Sophos report stressed that since Microsoft closed a loophole that allowed the Poortry creators to use custom kernel-level drivers signed through Microsoft’s attestation signing process, the developers have added new features and functions to evade detection. These include using Signature Timestamp Forging or obtaining a valid leaked non-Microsoft digital certificate, the report said. In the past 17 months, threat actors swapped the signing certificate they used for their executables at least nine times. Sophos has seen a threat actor deploy variants of Poortry on different machines within a single estate during an attack. These variants contain the same payload, but are signed with a different certificate than the driver first used during the attack. In August 2023, for example, attackers initially got into an organization through a remote access tool named SplashTop. As soon as the attackers were on the network, they deployed Poortry and Stonestop. Fortunately, in this case the signer name, “bopsoft,” was already known as a stolen certificate, and was blocked by the target firm’s defenses. But within 30 seconds, the attackers loaded a different Poortry driver, this one signed by “Evangel Technology (HK) Limited.” This attempt, too, was blocked. In another recent attack Sophos investigated, the Poortry loader was signed with a certificate with the name “FEI XIAO” and dated Thursday, August 8. Sophos said it has “high confidence” the timestamp was forged. “What was once a relatively simple tool for unhooking ‘troublesome’ endpoint protection components has become, in and of itself, a Swiss Army Knife of malicious capabilities abusing a virtually limitless supply of stolen or improperly used code signing certificates in order to bypass Driver Signature Verification protections,” Sophos said. In addition to the EDR-killing power, Sophos said Poortry has evolved into something akin to a rootkit that also has finite controls over a number of different API calls used to control low-level operating system functionality. Related content feature Ransomware recovery: 8 steps to successfully restore from backup The best way to recover from a ransomware attack is to have a reliable and fast backup process. Here's how to do it. By Maria Korolov 02 Sep 2024 17 mins Ransomware Malware Backup and Recovery feature 15 infamous malware attacks: The first and the worst Whether by dumb luck or ruthless skill, these malware attacks left their mark on the internet. By Josh Fruhlinger and John Leyden 30 Aug 2024 16 mins Ransomware Cyberattacks Malware news Iranian threat actors targeting businesses and governments, CISA, Microsoft warn Pioneer Kitten and Peach Sandstorm both believed to be state sponsored. By Howard Solomon 29 Aug 2024 7 mins Ransomware Cyberattacks Malware PODCASTS VIDEOS RESOURCES EVENTS SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe