Defendnot 通过伪装成反病毒解决方案禁用 Windows Defender
Defendnot是一款新工具,通过利用Windows安全中心(WSC)API注册为合法杀毒软件来禁用Windows Defender。该工具由GitHub开发者es3n1n开发,无需依赖现有杀毒软件代码,而是直接与WSC交互。其工作原理涉及反向工程WSC服务和验证机制,并利用任务管理器作为宿主进程。尽管展示了技术实力,但安全专家警告其可能被恶意滥用。 2025-5-12 05:54:2 Author: cybersecuritynews.com(查看原文) 阅读量:8 收藏

Defendnot Disables Windows Defender

Defendnot, a sophisticated new tool that effectively disables Windows Defender by exploiting the Windows Security Center (WSC) API to register itself as a legitimate antivirus solution. 

The Windows Security Center service is designed to ensure Windows computers maintain adequate security protection. 

When third-party antivirus software is installed, it registers with WSC, which then automatically disables Windows Defender to prevent conflicts.

Google News

Developed by a GitHub developer known as “es3n1n”, the tool is noteworthy for its direct interaction with WSC without relying on code from existing antivirus products.

This release comes approximately one year after the developer’s previous tool, “no-defender,” was removed following a DMCA takedown request.

“There’s a WSC (Windows Security Center) service in Windows which is used by antiviruses to let Windows know that there’s some other antivirus in the hood and it should disable Windows Defender,” the developer shared in a report with Cyber Security News. 

“This WSC API is undocumented and furthermore requires people to sign an NDA with Microsoft to get its documentation.”

Defendnot Disable Windows Defender

According to the developer’s detailed blog post, creating defendnot involved extensive reverse engineering of the WSC service and identifying the process validation mechanisms Microsoft employs. 

The project faced significant technical challenges, including understanding how WSC validates calling processes before allowing them to register as antivirus solutions.

A critical discovery was that WSC performs checks on processes attempting to register, including verifying the IMAGE_DLLCHARACTERISTICS_FORCE_INTEGRITY flag in the PE header and examining digital signatures. 

The Task Manager (Taskmgr.exe) met these requirements and could be used as a “victim process” to host the defendnot code.

The tool uses COM interfaces to interact with WSC, registering a phantom antivirus product. When Windows detects this “antivirus,” it automatically disables its built-in protection. 

Security researcher Will Dormann highlighted the tool on social media, noting that it “uses this technique to install a null AV product, thus having the effect of simply disabling Microsoft Defender.”

Technically, defendnot implements interfaces such as IWSCProductList to interact with WSC and utilizes undocumented Windows APIs that Microsoft typically only shares with certified antivirus vendors through their Microsoft Virus Initiative (MVI) program under NDA.

The tool includes several commands:

One limitation noted by the developer is that “to keep this WSC stuff even after reboot, defendnot adds itself to the autorun. Thus, you would need to keep the defendnot binaries on your disk.”

While the tool demonstrates impressive technical knowledge and reverse engineering skills, security experts caution that such utilities could potentially be misused by malware authors seeking to disable security protections. 

However, it’s worth noting that defendnot requires administrative privileges to function, limiting its potential for covert deployment.

For security researchers and administrators, this tool provides valuable insights into how Windows manages security product integration and highlights potential areas where Microsoft’s security architecture could be strengthened to prevent similar bypasses in the future.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download


文章来源: https://cybersecuritynews.com/defendnot-disables-windows-defender/
如有侵权请联系:admin#unsafe.sh