🔴 HIGHintel

SilentButDeadly Tool Disrupts EDR Cloud Telemetry via WFP

Category:Threat Alerts
SilentButDeadly is an open-source Windows tool that targets EDR and antivirus architectures by blocking their network communications using the Windows Filtering Platform. Instead of killing security processes, the SilentButDeadly tool programmatically inserts temporary, bidirectional firewall filters around EDR processes like SentinelAgent.exe and MsMpEng.exe, effectively isolating them from their cloud backends. This technique, an evolution of the earlier EDRSilencer concept, maps directly to T1562 (Impair Defenses) and T1070 (Indicator Removal) because it cuts off telemetry and remote command channels while leaving local scanning mostly intact. For red teams, this offers a powerful way to simulate EDR evasion; for defenders, it highlights a blind spot in cloud-centric endpoint detection strategies. The tool works by enumerating processes via standard Windows APIs, identifying EDR components based on a configurable target list, and then initializing a dynamic Windows Filtering Platform session. It installs per-process filters at ALE layers for outbound connection attempts and inbound responses, using high-priority weights and AppID-based conditions to avoid collateral damage. Because filters are dynamic and tied to a specific session, SilentButDeadly can clean up rules on exit, reducing persistent artifacts and complicating forensic analysis. Optional flags allow persistent filters or verbose logging, and the default behavior is to rely only on documented user-mode APIs with administrator privileges, avoiding kernel tampering that might trigger low-level integrity checks. Business risk arises because many modern EDR deployments assume consistent cloud connectivity for event streaming, detection updates, and remote response actions. If an attacker or malicious insider can run SilentButDeadly or a similar WFP-based evasion technique, they can silently neuter cloud telemetry while keeping EDR services running to avoid raising alarms, creating a window for data exfiltration or lateral movement. Organizations that depend on cloud-managed EDR for compliance reporting or regulated logging can find themselves out of alignment with expectations under SOC 2, ISO 27001, or sectoral rules if key telemetry paths are disabled without detection. Defenders should treat SilentButDeadly as both a red-team utility and a proof of concept for a broader EDR evasion class and update detection strategies accordingly. Recommended mitigations include tightening administrator rights, monitoring Windows Filtering Platform event logs and configuration changes for unexpected filters around security processes, and validating that EDR agents enforce local tamper protection for network rules. Security teams can also ingest WFP configuration snapshots into SIEM pipelines, baseline legitimate EDR connectivity, and alert when cloud heartbeat or telemetry patterns deviate from normal, even when processes appear to run normally on endpoints.

🎯CORTEX Protocol Intelligence Assessment

Business Impact: SilentButDeadly exposes a structural weakness in EDR deployments that rely heavily on cloud telemetry, enabling attackers to impair defenses without obvious signs by cutting off network communication rather than killing processes. If abused in production, this EDR evasion technique could allow ransomware or data exfiltration operations to proceed with minimal detection, undermining compliance reporting and incident response readiness. Technical Context: The tool leverages the Windows Filtering Platform to install process-specific filters that block outbound and inbound network flows for targeted EDR and AV executables, mapping to T1562 (Impair Defenses) by degrading monitoring and T1070 (Indicator Removal) by removing telemetry. Because it relies on documented user-mode APIs and dynamic sessions, it can leave a smaller forensic footprint than kernel-mode tampering while still neutralizing cloud-connected EDR sensors.

Strategic Intelligence Guidance

  • Restrict and monitor administrator privileges on Windows systems, ensuring that red-team tooling and unsigned binaries like SilentButDeadly cannot run on production endpoints without strong authorization.
  • Instrument Windows Filtering Platform logs and configuration changes to detect new filters that reference EDR or AV processes, and create alerts when security software loses cloud connectivity unexpectedly.
  • Validate that EDR agents enforce tamper-protection policies around firewall and network stack manipulation, and test vendor behavior using tools such as SilentButDeadly in controlled lab environments.
  • Incorporate WFP and EDR connectivity checks into continuous monitoring, baselining expected telemetry patterns and alerting when endpoint agents remain running but stop sending events to the cloud.

Vendors

MicrosoftSentinelOneInvariant Labs

Threats

EDR evasion tooling

Targets

Windows EDR agentsCloud-managed AV platforms