Bring Your Own Installer EDR Bypass Observed in Ransomware Operation

Industry
Written by
Anthony M. Freed
Published on
Jun 17, 2025

A new "Bring Your Own Installer" technique is actively being exploited in ransomware attacks to disable endpoint defenses by bypassing tamper protection in a leading EDR solution. This method allows attackers to terminate EDR agents and deploy ransomware, leaving systems exposed and unprotected.

Unlike typical EDR bypasses that use third-party drivers or tools, this technique leverages the vendor’s own installer, Bleeping Computer reports.

Researchers discovered that during agent upgrades, the installer temporarily shuts down the EDR’s protection services before replacing system files. Threat actors exploit this moment by forcefully terminating the installer process—specifically the Windows Installer (msiexec.exe)—after protections are disabled but before the new agent is deployed.

The technique was uncovered by incident response researchers during a ransomware investigation earlier this year. Attackers had already gained administrative access to the network via a vulnerability and then executed this bypass to disable endpoint defenses. Notably, this method works across multiple versions of the agent, making even updated environments vulnerable if misconfigured.

Mitigation guidance was issued in early 2025, urging organizations to enable a security feature called “Online Authorization,” which requires approval before any local upgrade, downgrade, or uninstall can proceed. This setting is disabled by default in existing deployments but has since been turned on by default for new installations.

Another leading security vendor confirmed that their own EDR software was not affected, though the underlying technique could theoretically apply to other endpoint solutions with similar architecture.

Takeaway: EDR isn’t the problem, it's the battlefield. This latest “Bring Your Own Installer” trick is a perfect example of how attackers aren’t just slipping past defenses, they’re weaponizing the tools already available on the network.  

This isn’t some obscure lab technique or proof-of-concept. It was used in a real-world ransomware attack, against a real organization with a mature security stack.  

No shady drivers, no exotic payloads, just a clever abuse of the legitimate agent installer to quietly kill security controls before the payload dropped. It’s a game now, and the takeaway isn’t that EDR failed, it’s that ransomware crews are evolving faster, and security vendors just can’t keep up.

Attackers are investing heavily in EDR bypasses. They’re building tools to blind, unhook, or kill endpoint agents before they move to exfiltration or encryption. BYOVD attacks, kernel-level unhooking, signed payloads, and now installer abuse—it’s all on the table.

We’re well into the era of EDR-Killers—tools purpose-built to blind, disable, or rip endpoint agents right out of memory. And these crews are treating EDR evasion as a core capability, not an afterthought. It’s part of the standard playbook now.

EDR is essential for any enterprise environment, but its presence doesn’t automatically mean you’re protected. The attackers are crafting operations that can maneuver in protected environments, and this latest technique just shows how creative they can be.

Automated recovery, attack containment, and anti-ransomware solutions that assume EDR might lose a round—that’s how you survive the modern ransomware playbook. Because the question isn’t if attackers will try to knock out your defenses. It’s whether you’ve got a plan for when they do.

 

Halcyon.ai eliminates the business impact of ransomware. Modern enterprises rely on Halcyon to prevent ransomware attacks, eradicating cybercriminals’ ability to encrypt systems, steal data, and extort companies – talk to a Halcyon expert today to find out more, and check out our quarterly RaaS and extortion group reference guide, Power Rankings: Ransomware Malicious Quartile.

A laptop screen with a message that says Take Zero Chances With Ransomware.
Get a Demo

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

Halcyon Tech Inc is committed to protecting and respecting your privacy, and we’ll only use your personal information to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below:

You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy

By clicking submit below, you consent to allow halcyon.ai to store and process the personal information submitted above to provide you the content requested.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.