Ransomware Attack Bypasses EDR with BYOI Technique

Industry
Written by
Anthony M. Freed
Published on
May 6, 2025

A newly discovered "Bring Your Own Installer" technique is being used to bypass SentinelOne’s tamper protection and disable its EDR agents, clearing the way for attackers to deploy Babuk ransomware.  

The technique, uncovered by researchers during a ransomware investigation, exploits a flaw in SentinelOne’s agent upgrade process. Instead of relying on third-party tools, threat actors use the legitimate SentinelOne installer to terminate active EDR processes.  

By forcefully stopping the install after it shuts down protections but before a new agent version launches, attackers leave devices unprotected, Bleeping Computer Reports.

The bypass does not depend on specific versions—Stroz Friedberg found it effective across multiple releases. Logs from the investigated incident showed attackers gained administrative access through a vulnerability, then ran the SentinelOne installer and killed the msiexec.exe process mid-install. This dropped the host offline in the SentinelOne console and allowed ransomware deployment.

SentinelOne privately issued mitigation guidance in January 2025, urging customers to enable the "Online Authorization" policy setting, which blocks unauthorized local upgrades or uninstalls. However, many environments still had it disabled. Ailes emphasized the importance of raising awareness, noting that even with guidance issued, clients remained vulnerable.

To help others, SentinelOne shared details with major EDR vendors. Palo Alto Networks confirmed that its EDR platform is not affected. This case highlights how native software functions—like installer behavior—can be hijacked if not properly secured and underscores the urgency of enforcing security policy settings in EDR deployments.

Takeaway: Let’s just call it what it is—attackers are turning your own tools against you. This “Bring Your Own Installer” trick is a perfect example. They’re not sidestepping security—they’re walking right through the front door, using legitimate installers to kill the EDR agent, then dropping ransomware while your system thinks everything’s normal.

This isn’t some fringe technique. Ransomware crews are putting real time and money into building EDR killers that don’t just evade— they neutralize. They know how endpoint protection works because they reverse-engineer it. They know exactly when to strike—like during an upgrade, when protections are temporarily offline—and they exploit that gap with surgical precision.

And here’s the truth most vendors won’t say out loud: EDR can be blinded, unhooked, or disabled. Full stop. Doesn’t matter how advanced the AI is or how pretty the dashboards are. If ransomware gets to the point where it’s encrypting files or stealing data, your EDR already lost.

The answer isn’t ditching EDR—it’s accepting that prevention alone isn’t enough. You need resilience. You need the ability to detect tampering and recover instantly when your first layer fails—because it will fail eventually.

Attackers aren't guessing. They’re executing playbooks. The question is whether your defenses are ready for the second move—because ransomware always comes with one.

 

Halcyon.ai eliminates the business impact of ransomware. Modern enterprises rely on Halcyon to prevent ransomware attacks, eradicating cybercriminals’ ability to encrypt systems, steal data, and extort companies – talk to a Halcyon expert today to find out more, and check out our quarterly RaaS and extortion group reference guide, Power Rankings: Ransomware Malicious Quartile.

A laptop screen with a message that says Take Zero Chances With Ransomware.
Get a Demo

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

Halcyon Tech Inc is committed to protecting and respecting your privacy, and we’ll only use your personal information to provide the products and services you requested from us. From time to time, we would like to contact you about our products and services, as well as other content that may be of interest to you. If you consent to us contacting you for this purpose, please tick below:

You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy

By clicking submit below, you consent to allow halcyon.ai to store and process the personal information submitted above to provide you the content requested.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.