> Back to All Posts

Crypto24 Ransomware Uses Custom EDR Evasion in Global Attack

Crypto24 Ransomware

Crypto24 ransomware is rapidly emerging as one of the most advanced cybercrime operations of the year. Security experts report that the group is executing well-planned attacks against large enterprises across multiple continents. Its operations combine tailored malware, legitimate administrative tools, and advanced evasion techniques to bypass industry-leading endpoint defenses. This calculated approach enables the attackers to remain hidden while exfiltrating sensitive data and preparing for widespread system encryption.

The group’s unique ability to adapt its tactics to different environments has made it a growing concern for security teams worldwide. Organizations that rely solely on conventional endpoint protection may find themselves unprepared for Crypto24’s customized and persistent methods.

A Sophisticated Global Campaign

First appearing publicly in September 2024, Crypto24 ransomware has now been linked to high-impact attacks across the United States, Europe, and Asia. The group targets industries including finance, manufacturing, entertainment, and technology. They often strike during off-peak hours, reducing the likelihood of rapid detection.

Stealthy Persistence and Reconnaissance

Once inside a network, attackers create or reactivate privileged accounts for persistence. They run custom batch scripts to collect system details, including hardware configurations and user lists. Two malicious Windows services, WinMainSvc and MSRuntime, maintain control. WinMainSvc acts as a keylogger disguised as a Microsoft component, while MSRuntime loads the ransomware payload.

Custom EDR Evasion Capabilities

The group’s RealBlindingEDR tool is designed to disable security solutions at the kernel level. It targets well-known vendors such as Trend Micro, Kaspersky, McAfee, Cisco, Fortinet, and Acronis. In some cases, attackers use legitimate tools like XBCUninstaller to remove endpoint defenses. This approach combines malware capabilities with abuse of trusted software.

Lateral Movement and Data Theft

Crypto24 ransomware spreads through networks using SMB shares and remote access tools such as PSExec and AnyDesk. Data theft precedes encryption, with stolen files uploaded to Google Drive through a custom exfiltration tool. Before encryption, the attackers remove shadow volume copies to block recovery attempts.

Defensive Measures

Experts recommend strict admin account management, restriction of remote tools, and enabling EDR self-protection features. Monitoring for suspicious service creation, outbound cloud traffic, and unusual use of administrative utilities is critical. Offline backups remain a vital safeguard against data loss.

Final Thoughts

The Crypto24 ransomware campaign underscores a troubling shift in the ransomware landscape. Attackers are no longer relying solely on generic payloads or off-the-shelf malware. Instead, they are investing in customized tools, blending them with legitimate utilities to bypass defenses that once seemed impenetrable.

Enterprises must treat this as a wake-up call to strengthen their security posture. Proactive monitoring, rapid incident response, and layered defenses are now essential, not optional. By understanding Crypto24’s tactics and preparing accordingly, organizations can reduce the risk of disruption and financial loss.

 

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.