EDR has become so effective at stopping malware infections early on that cybercriminals are increasingly turning to techniques that allow them to operate beyond the reach of such tools. As indicated by ExtraHop, the three most commonly used approaches are:
1️⃣ Credential theft
Stealing logins and passwords is currently the most popular method to gain access to an organization’s resources. According to the 2024 Verizon Data Breach Investigations Report, credential theft played a role in more than half of all analyzed breaches. When attackers impersonate a legitimate user, they do not raise suspicions in EDR systems – which gives them time to assess the environment and prepare subsequent stages of the attack.
2️⃣ Exploiting vulnerabilities
The growing number of vulnerabilities – including zero-day ones, in both server software and security solutions themselves – provides cybercriminals with an ideal pathway into the depths of the organization’s network without needing to interact with endpoints. More of them are using specialized tools known as EDR killers, capable of disabling or bypassing EDR agents.
3️⃣ Living off the land – using built-in system tools
Instead of deploying classic malware, attackers eagerly use tools already available in the system – such as PowerShell, found on every Windows device. This allows adversaries to execute commands, move around the network, and exfiltrate data without triggering antivirus alerts or malware signatures. This approach is much harder to detect because it doesn’t generate classic malware artifacts.