• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
researchers uncover 'process ghosting' — a new malware evasion technique

Researchers Uncover ‘Process Ghosting’ — A New Malware Evasion Technique

You are here: Home / General Cyber Security News / Researchers Uncover ‘Process Ghosting’ — A New Malware Evasion Technique
June 17, 2021

Cybersecurity researchers have disclosed a new executable impression tampering attack dubbed “Course of action Ghosting” that could be perhaps abused by an attacker to circumvent protections and stealthily operate destructive code on a Windows process.

“With this technique, an attacker can produce a piece of malware to disk in this sort of a way that it can be difficult to scan or delete it — and where by it then executes the deleted malware as although it were a regular file on disk,” Elastic Security researcher Gabriel Landau stated. “This approach does not include code injection, Procedure Hollowing, or Transactional NTFS (TxF).”

Stack Overflow Teams

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Process Ghosting expands on earlier documented endpoint bypass methods these kinds of as Procedure Doppelgänging and Process Herpaderping, thus enabling the veiled execution of malicious code that may evade anti-malware defenses and detection.

System Doppelgänging, analogous to Procedure Hollowing, includes injecting arbitrary code in the deal with house of a genuine application’s stay procedure that can then be executed from the reliable support. Method Herpaderping, initial comprehensive past October, describes a method to obscure the behavior of a managing process by modifying the executable on disk just after the picture has been mapped in memory.

The evasion operates because of “a hole between when a process is established and when security products and solutions are notified of its development,” offering malware developers a window to tamper with the executable right before security solutions can scan it.

Malware Evasion Technique

Process Ghosting goes a step further more from Doppelgänging and Herpaderping by earning it doable to run executables that have now been deleted. It can take advantage of the fact that Windows’ makes an attempt to avert mapped executables from staying modified or deleted only arrive into impact immediately after the binary is mapped into an image segment.

“This usually means that it is feasible to make a file, mark it for deletion, map it to an picture segment, near the file handle to comprehensive the deletion, then make a system from the now-fileless area,” Landau described. “This is Procedure Ghosting.”

In a evidence-of-notion (PoC) demo, the scientists in depth a situation wherein Windows Defender attempts to open a destructive payload executable to scan it, but fails to do so for the reason that the file is in a delete-pending state, and then fails once more as the file is presently deleted, hence enabling it to be executed unimpeded.

Elastic Security mentioned it noted the issue to Microsoft Security Response Middle (MSRC) in Might 2021, next which the Windows maker claimed the issue “does not fulfill their bar for servicing,” echoing a similar response when Method Herpaderping was responsibly disclosed to MSRC in July 2020.

Prevent Data Breaches

Microsoft, for its portion, has due to the fact unveiled an updated version of its Sysinternals Suite before this January with an improved System Check (aka Sysmon) utility to enable detect System Herpaderping and Process Hollowing attacks.

As a end result, Sysmon variations 13.00 (and later) can now produce and log “Occasion ID 25” when a piece of malware tampers with a legit procedure and if a course of action impression is transformed from a various approach, with Microsoft noting that the function is induced “when the mapped image of a approach would not match the on-disk picture file, or the graphic file is locked for special access.”

Observed this article fascinating? Adhere to THN on Facebook, Twitter  and LinkedIn to read through a lot more exceptional material we submit.


Some elements of this article are sourced from:
thehackernews.com

Previous Post: «vulnerability in peloton bikes one example of a more widespread Vulnerability in Peloton bikes one example of a more widespread security issue
Next Post: Strengthen Your Password Policy With GDPR Compliance strengthen your password policy with gdpr compliance»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.