RONINGLOADER: DragonBreath's New Path to PPL Abuse

Elastic Security Labs uncovered a campaign by DragonBreath APT using a multi-stage loader named RONINGLOADER to deploy an updated gh0st RAT variant. The malware employs various evasion techniques targeting Chinese EDR tools, including signed driver abuse, thread-pool injection, and PPL exploitation to disable Microsoft Defender. The infection chain begins with trojanized NSIS installers masquerading as legitimate software. RONINGLOADER leverages multiple stages to terminate antivirus processes, apply custom WDAC policies, and inject the final payload into trusted system processes. The campaign demonstrates an evolution in DragonBreath's tactics, showcasing adaptability and sophisticated evasion methods.

Pulse ID: 691d85c636ef7e742328d734
Pulse Link: https://otx.alienvault.com/pulse/691d85c636ef7e742328d734
Pulse Author: AlienVault
Created: 2025-11-19 08:54:30

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#Chinese #CyberSecurity #EDR #ElasticSecurityLabs #ICS #InfoSec #Malware #Microsoft #MicrosoftDefender #OTX #OpenThreatExchange #RAT #Rust #Trojan #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange

RT by @SwiftOnSecurity: ๐Ÿš€ ๐—ก๐—ฒ๐˜„ ๐—ถ๐—ป ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐——๐—ฒ๐—ณ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—ข๐—ณ๐—ณ๐—ถ๐—ฐ๐—ฒ 365

Security teams can now trigger key email remediation actionsโ€”๐—ฆ๐˜‚๐—ฏ๐—บ๐—ถ๐˜ ๐˜๐—ผ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜, ๐—”๐—ฑ๐—ฑ ๐˜๐—ผ ๐—ฎ๐—น๐—น๐—ผ๐˜„/๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ ๐—น๐—ถ๐˜€๐˜, and ๐—œ๐—ป๐—ถ๐˜๐—ถ๐—ฎ๐˜๐—ฒ ๐—ฎ๐˜‚๐˜๐—ผ๐—บ๐—ฎ๐˜๐—ฒ๐—ฑ ๐—ถ๐—ป๐˜ƒ๐—ฒ๐˜€๐˜๐—ถ๐—ด๐—ฎ๐˜๐—ถ๐—ผ๐—ปโ€”directly from the ๐—”๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—›๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด interface.

No policy changes needed. Enabled by default since Nov 10, 2025.

Streamlined threat response, powered by your queries.

#MicrosoftDefender #AdvancedHunting #CyberSecurity #incidentresponse

๐Ÿฆ๐Ÿ”—: https://nitter.oksocial.net/0x534c/status/1988608813323411545#m

[2025/11/12 14:04]

Microsoft Defender for Endpoint delivers industry-leading anti-virus protection, but navigating its licensing tiers, pricing models, and feature sets can be incredibly confusing.

Join us today on Defender Fridays with Ken Westin, Senior Solutions Engineer at LimaCharlie, as we break down:

> The differences between the various tiers

> Ways to solve Defender visibility issues and increase operational transparency.

> How its capabilities can be customized and expanded for better flexibility and scalability for service providers

This is an interactive session - bring your questions and let's explore the benefits and drawbacks together.

#defenders #cybersecurity #microsoftdefender #infosec

Tomorrow, October 15th at 10am PT - hands-on workshop on Microsoft Defender automation.

We'll demonstrate how to augment Windows Defender Antivirus with centralized management capabilities that eliminate manual processes and accelerate threat detection.

What we'll cover:

> Verify Defender deployment status across your entire Windows infrastructure in seconds
> Capture endpoint security events at wire speed without relying on Microsoft's collection timelines
> Execute AV scans remotely across endpoints or schedule them to run automatically
> Configure detection and response rules tailored to your environment's specific needs

Final reminder: This is a live session and will not be recorded.

Register: https://limacharlie.wistia.com/live/events/su08f1kjsa?utm_campaign=virtual+workshop+microsoft+defender+10+15+25&utm_source=mastodon&utm_medium=social

#cybersecurity #secops #microsoftdefender

#MicrosoftDefender full scan on #Windows11 is not a good experience so far.

Want better visibility and control over Microsoft Defender?

We're running a hands-on virtual workshop on augmenting Windows Defender Antivirus with centralized management and automation capabilities using the SecOps Cloud Platform.

Session agenda:

> Gathering telemetry quicker than Microsoft's native collection methods
> Controlling instances across endpoints from a single interface
> Automating log collection at scale
> Enriching detection capabilities with custom rules
> Leveraging data retention to improve investigation speed

This session will not be recorded. Register now: https://limacharlie.wistia.com/live/events/su08f1kjsa?utm_campaign=virtual+workshop+microsoft+defender+10+15+25&utm_source=mastodon&utm_medium=social

#cybersecurity #secops #microsoftdefender

Microsoft Defender is stirring up troubleโ€”bogus BIOS alerts, misflagged emails, even Mac crashes. Can your trusted security tool really keep up when glitches hit?

https://thedefendopsdiaries.com/microsoft-defender-navigating-recent-bugs-and-the-ongoing-challenge-of-security-software-reliability/

#microsoftdefender
#securitysoftware
#falsepositives
#cybersecuritynews
#machinelearningsecurity

Microsoft Defender: Navigating Recent Bugs and the Ongoing Challenge of Security Software Reliability

Explore recent Microsoft Defender bugs, false positives, and the challenges of maintaining reliable, cross-platform security software in 2024.

The DefendOps Diaries
Handing out standing access in Defender XDR? Try PIMโ€‘forโ€‘Groups + RBAC.
My colleague Matt Novitsch posted a clean, screenshotโ€‘driven guide to enable justโ€‘inโ€‘time SecOps access across Defender workloads. Timeโ€‘boxed, auditable, leastโ€‘privilege. #EntraID #PIM #MicrosoftDefender #XDR #RBAC #ZeroTrust

Microsoft Teams is leveling up its security game by flagging sketchy links in chats. Could this be the breakthrough your team's been waiting for against phishing and malware?

https://thedefendopsdiaries.com/enhancing-security-in-microsoft-teams-malicious-link-warnings-and-beyond/

#microsoftteams
#cybersecurity
#maliciouslinks
#phishingprotection
#microsoftdefender

Patchday Microsoft: Azure, Office, Windows & Co. sind angreifbar

Damit Angreifer Sicherheitslรผcken nicht ausnutzen kรถnnen, mรผssen Admins sicherstellen, dass Windows Update aktiv ist: Es gibt wichtige Sicherheitspatches.

heise online