New Ransomware Tool Shanya Defeats EDR Systems with Advanced Evasion Tactics

Shanya EDR Killer: The New Arsenal in Ransomware’s Offensive

In the ever-evolving landscape of cyber threats, a formidable tool named Shanya has emerged, significantly enhancing the capabilities of ransomware groups. First surfacing in late 2024 under the alias VX Crypt, Shanya has rapidly become a preferred packer-as-a-service and Endpoint Detection and Response (EDR) killer among cybercriminals. Its design aims to neutralize security defenses, paving the way for successful ransomware deployments.

Technical Sophistication and Evasion Techniques

Shanya employs advanced techniques to evade detection and disable security measures:

– DLL Side-Loading: By exploiting legitimate system binaries like `consent.exe`, Shanya masks its malicious activities, making detection challenging.

– Bring Your Own Vulnerable Driver (BYOVD): The malware drops and exploits legitimate but vulnerable drivers, such as `ThrottleStop.sys`, to gain kernel-level privileges. This elevation allows it to bypass standard user-mode restrictions and directly attack the kernel callbacks used by endpoint protection platforms.

– Obfuscation and Anti-Analysis Mechanisms: Shanya’s loader is saturated with junk code to disrupt reverse engineering efforts. It also calls `RtlDeleteFunctionTable` with invalid contexts to crash debuggers and conceals its configuration data within the Process Environment Block (PEB), utilizing the `GdiHandleBuffer` as a covert repository for API pointers.

Integration with Ransomware Operations

Security analysts have observed Shanya’s integration into various ransomware campaigns, including those associated with Akira, Medusa, and Qilin. Its dual functionality as both a packer and an offensive tool allows it to dismantle defenses before the ransomware payload is decrypted, creating an environment where encryption processes can run uninterrupted.

Infection Dynamics and Kernel-Level Evasion

Once the kernel driver is active, Shanya’s user-mode component scans active services against a target list, sending instructions to the kernel driver (`hlpdrv.sys`) to forcibly terminate them. This process termination capability ensures that security products are disabled, allowing the ransomware to execute without interference.

Implications for Cybersecurity

The emergence of Shanya underscores the increasing sophistication of tools available to cybercriminals. Its ability to disable EDR systems and facilitate ransomware infections highlights the need for organizations to adopt comprehensive security strategies. This includes regular updates to security software, implementation of advanced threat detection mechanisms, and continuous monitoring of system activities to detect and respond to such advanced threats promptly.