Overview: EDR Hardening Against Malware Killers (EDR Killers)
EDR killers are specialized malware components designed to disable endpoint detection and response (EDR) solutions before deploying ransomware or other payloads. Tools like BlackSanta, AuKill, and Terminator use techniques including service termination, BYOVD (Bring Your Own Vulnerable Driver), registry manipulation, and process injection to blind security teams within minutes of initial compromise.
Hardening EDR solutions against these attacks requires enabling tamper protection in Microsoft Defender for Endpoint (MDE) via the Intune portal or Security Center, configuring process isolation for EDR agents, and enabling behavioral monitoring and real-time threat intelligence feeds. For CrowdStrike Falcon, enabling Falcon prevent mode with maximum prevention policy and sensor anti-tampering provides equivalent protection. Additional controls include attack surface reduction (ASR) rules to block driver abuse and WDAC/AppLocker policies to prevent unauthorized driver loading.
Tip: Monitor for EDR killer indicators of compromise (IOCs) by enabling Microsoft Defender XDR's advanced hunting to detect service stop commands targeting your EDR agent process names.



