New “Bring Your Own Installer” EDR Bypass Exploited in Ransomware Attack
A newly discovered technique is being leveraged by threat actors to bypass Endpoint Detection and Response (EDR) protections-specifically those provided by SentinelOne-through an abuse of its own update process. Dubbed the "Bring Your Own Installer" (BYOI) technique, this method disables the EDR's defenses long enough to allow for the deployment of ransomware, such as variants of Babuk, without interference. How the BYOI Technique Works Most EDR platforms, including SentinelOne, are designed with anti-tamper features that prevent uninstallation or modification without authorization-typically requiring administrative access or a unique passphrase. However, attackers have found a workaround that exploits the EDR's legitimate update mechanism. During an upgrade or downgrade, SentinelOne temporarily stops its active protections to replace the running components. By forcibly interrupting this process mid-way, threat actors leave the system in a vulnerable state-protection disabled, upgrade incomplete, and no alerts triggered. At this point, ransomware can be deployed with impunity. This method…
