Article
Anti-virus or AI driven Endpoint Protection?
Dec 22, 2020
Arete Analysis

Arete investigates a lot of ransomware attacks. In fact, 90% of our business is helping organizations big and small, recover from and investigate ransomware attacks. Variants like Maze, Sodinokibi, WastedLocker, Ryuk, Conti, Dopplepaymer, Dharma and countless others are extremely active every day of every week. Whether they are hacking into an organization and deploying their ransomware or they are responding to emails to negotiate the release of decryption keys, these groups will continue to operate with the main focus of disrupting businesses by encrypting files, stealing data and waiting to receive payment for decryption keys.
One of the common themes across our client organizations is their reliance on anti-virus (“AV”). When discussing the initial facts of a ransomware infection and learning about their environment, I usually ask “Do you use AV and what is the name?” All the clients respond with “yes, we use AV” and the software used are across the board. Bitdefender, Windows Defender, Sophos, McAfee, Symantec, TrendMicro, and Webroot are among the common responses; and they all offer ransomware protection.
The products themselves are great. They stop a large majority of malware. They have been pioneers in the computer security industry. They have built networks and distribution systems for virus definition updates. They have even built out response teams to gather intelligence from client’s networks who have suffered a breach in order to make their products better to aid other customers. There have been countless tests of their products and rankings from non-lab environments up to Gartner reports. Even TechRadar’s recent article “Do I really need antivirus for Windows 10?” highlights the need for AV and lists some great recommendations. I do encourage you to read the article, but the summary of it is “Yes. You need AV”. In fact, your organization needs more than just AV, it needs a true endpoint protection that leverages Artificial Intelligence (“AI”) as well as real time updates to its rule sets (notice how I did not state virus definitions? More on that later).
As a computer security aficionado, incident responder, trusted advisor, and empathetic human, it pains me to find out these reputable products repeatedly fail protecting large and small networks from malicious activities performed by these threat actors. Organization after organization purchase these licenses, deploy the product then at some point in the future become a victim of a cyber-attack. Simply purchasing AV software and deploying it, is no longer good enough.
The intent of this article is to demonstrate where traditional AV capabilities fall short based on the Tactics, Techniques, and Procedures (“TTP”) used by the threat actors. Again, the AV products I mentioned earlier are great products. There is nothing wrong with their ability to detect malware and prevent it. If those products are in use, then implementing compensating controls can enhance detection of unauthorized access and minimize the success of an attack.
Traditional AV and EDR Defined
For the purposes of this article, I am going to draw a vast difference between “traditional AV” and Endpoint Detection and Response (“EDR”) software. I have generalized the functionality to not specifically compare product by product, rather I intend to compare the category of traditional AV to EDR tools.
Traditional AV – Definition based or signature scanning that searches for a known-known. Meaning, if the malware is known by the security community, the product should identify it. Some of the products may also have passive endpoint behavioral monitoring.
EDR software – Some developers are calling their products Next Generation AV. EDR tools offer traditional AV scanning, AI detection, active EDR monitoring, and restoration.
AI detection – the EDR agent will monitor the system and examine the calls or events specific processes make on the system or across the network. The agent then analyzes these events and if the events are determined to be malicious, the processes are stopped.
Active EDR monitoring – These EDR agents can be monitored by a Security Operations Center (“SOC”) for additional support, triage, threat hunting and quicker response to threats including centralized logging of activity for historical analysis or forensics, near instant detection, and immediate containment.
Tamperproof agent – The agent on the endpoint cannot be uninstalled by an administrator account. Rather, uninstall must be initiated from the central software console.
Restoration – Some EDR solutions leverage windows volume shadow service to create a snapshot of the system and if a threat is detected, roll the system back to a clean state all the while retaining vital forensic evidence from the event.
Right from the start, the EDR tools offer three critical components as compared to traditional AV: AI detection, active EDR monitoring, and tamperproof agents. These components align well with protection computers any time and anywhere.
Attack Flow
The threat actors, in a large majority of ransomware attacks, follow a very similar attack sequence across variants and across matters:
Identify a target or victim – usually by scanning for misconfigured system, phishing email, or watering-holeweb attack
Exploit target – Gain access to the target system.
Reconnaissance – Examine the target system ß this is THE critical step.
Escalate privileges – Obtain administrator credentials for the system or the domain.
Establish persistence – Create a backdoor to allow re-entry into the network.
Lateral movement – Identify additional systems on the network such as domain controllers or backups.
Data exfiltration – Package up and steal data for additional extortion.
Deploy ransomware – Encrypt files and wait for contact from the victim.
The attack flow listed above has been simplified from other theories that exist in the cybersecurity community. This flow is intended to simply depict the sequence of steps the attack follows across each attack. I’ve purposefully highlighted step 3 Reconnaissance to examine it further against the TTPs of these threat actors.
Threat Actor TTPS
Once a threat actor gains access to the target system, there is a wealth of information the threat actor can gather from that single system. Information about the domain name, previously logged on users, privilege level of the logged-on account, running applications, and available hosts within the network. This information is easily obtained by running a few commands which are resident on any Windows system.
The most important piece of information they can obtain after gaining access is about the security software on the system and the privilege level of the account.
Privilege level of the account will determine how the attack can disable or modify security software to prevent the detection of their attacker tool package they may intend to copy to the system. Privilege level will also determine what additional system resources they would have access to as that user.
Security software installed on the system will give perspective to the threat actor on the organization’s approach to security as well as determine ways to disable the software from scanning and alerting.
During many investigations, Arete Incident Responders have observed threat actors gaining access to systems, then returning days or weeks later with customized batch scripts or PowerShell scripts designed to disable AV and backup products from functioning correctly.
Examples of scripts and tactics recovered from investigations:
Batch script to unload the virus definitions from Microsoft Defender. Once the definitions were unloaded, the AV scanning engine would be useless because it would not know what to look for. This is creative as it does not disable the running service that may cause an alert that the Defender service stopped on a system. Instead, the threat actor chose to unload the definitions in hopes that those events are not monitored by a log aggregator.
Batch script to disable Symantec Endpoint Protection (“SEP”). The threat actor had already gained access to the system with escalated privileged, aka Administrator account. They ran the script to disable the SEP services. The victims’ environment was not configured to alert when the SEP services were disabled.
Batch script to white list specific folders. The TA essentially used the white listing or exclusion functionality against the AV product. Once executed, the script added a specific folder to be excluded from AV scanning then used that folder to stage their tools.
Dumping of browser cached credentials to obtain usernames, passwords, and logon URLs for centrally managed AV products. Once the threat actor gained access to the central console, they disabled AV scanning for all the available hosts.
In each of these scenarios above, the actions performed were not through malware. Rather, the threat actor had interactive access to the system and was able to a variety of methods to disable AV prior to downloading their tools, living-off-the-land (“LOTL”) and ultimately ransomware payloads. The AV did not even have a chance to detect the malware because it was disabled prior to the malware reaching the system.
EDR enhanced protection
Arete Incident Responders respond to incidents with a large toolkit of cybersecurity products. The tool of choice to investigate, contain, and eradicate ransomware threats for Arete IR is SentinelOne. Once deployed, the agent cannot be uninstalled by a typical administrator account. Additionally, access to the central console is limited, invite only, and multi-factor authentication is used.
Understanding the actions, the threat actors perform during their reconnaissance phase, traditional AV products have a high chance of missing those actions. Whereas a next generation endpoint protection tool like SentinelOne would inhibit the threat actor’s ability to successfully recon the environment.
Scripts to unload definitions: SentinelOne would detect any attempts to modify the agent causing an alert within the central console as well as blocking the process from continuing.
Scripts to whitelist or exclude directories: Exclusion of directories from scanning can only be modified via the console interface. The endpoint itself cannot modify the exclusion list.
Dumping of cached credentials from the browser: Detection of these tools are commonly identified as Potentially Unwanted Application or Program (PUA/P). SentinelOne would detect these and prevent them from executing.
Scripts to disable the SentinelOne agent would fail. The agent itself can only be uninstalled by initiating uninstall from the console or by using a pass phrase obtained from the central console. The pass phrase is uniquely generated for each endpoint.
In addition to the power of the tamper proof agent from SentinelOne, the attempts of modifying or abnormal activity by the user account would be detected by the AI scanning engine which would create an alert. The alert could then be triaged quickly to identify unauthorized access and, by using a new feature not previously discussed, SentinelOne could isolate the system from the network.
Network isolation, as it pertains to SentinelOne, allows the incident responder to disable network connectivity for that endpoint except for connection to the console. This would remove the threat actor from accessing that system and allow the incident response team to continue their investigation.
Summary
The observations made by Arete Incident Responders has identified threat actors are aware of the environment they penetrate. Instead of just blindly copying their tools to the compromised systems, the threat actors are looking for installed security software to minimize alerts by disabling or bypassing the security software. The commercially, widely, and easily available AV products have limitations with being tamperproof and can be removed by the threat actors because of the escalated privileges they have obtained. Organizations should move either implement compensating controls for traditional AV solutions to detect any changes to the software or implement an ERD solution like SentinelOne to inhibit and prevent future success from these threat actors.
Back to Blog Posts
Article
Feb 20, 2026
Threat Actors Leveraging Gemini AI for All Attack Stages
State-backed threat actors are leveraging Google’s Gemini AI as a force multiplier to support all stages of the cyberattack lifecycle, from reconnaissance to post-compromise operations. According to the Google Threat Intelligence Group (GTIG), threat actors linked to the People’s Republic of China (PRC), Iran, North Korea, and other unattributed groups have misused Gemini to accelerate target profiling, synthesize open-source intelligence, identify official email addresses, map organizational structures, generate tailored phishing lures, translate content, conduct vulnerability testing, support coding tasks, and troubleshoot malware development. Cybercriminals are increasingly exploring AI-enabled tools and services to scale malicious activities, including social engineering campaigns such as ClickFix, demonstrating how generative AI is being integrated into both espionage and financially motivated threat operations.
What’s Notable and Unique
Threat actors are leveraging Gemini beyond basic reconnaissance, using it to generate polished, culturally nuanced phishing lures and sustain convincing multi-turn social engineering conversations that minimize traditional red flags.
In addition, threat actors rely on Gemini for vulnerability research, malware debugging, code generation, command-and-control development, and technical troubleshooting, with PRC groups emphasizing automation and vulnerability analysis, Iranian actors focusing on social engineering and malware development, and North Korean actors prioritizing high-fidelity target profiling.
Beyond direct operational support, adversaries have abused public generative AI platforms to host deceptive ClickFix instructions, tricking users into pasting malicious commands that deliver macOS variants of ATOMIC Stealer.
AI is also being integrated directly into malware development workflows, as seen with CoinBait’s AI-assisted phishing kit capabilities and HonestCue’s use of the Gemini API to dynamically generate and execute in-memory C# payloads.
Underground forums show strong demand for AI-powered offensive tools, with offerings like Xanthorox falsely marketed as custom AI but actually built on third-party commercial models integrated through open-source frameworks such as Crush, Hexstrike AI, LibreChat-AI, and Open WebUI, including Gemini.
Analyst Comments
The increasing misuse of generative AI platforms like Gemini highlights a rapidly evolving threat landscape in which state-backed and financially motivated actors leverage AI as a force multiplier for reconnaissance, phishing, malware development, and post-compromise operations. At the same time, large-scale model extraction attempts and API abuse demonstrate emerging risks to AI service integrity, intellectual property, and the broader AI-as-a-Service ecosystem. While these developments underscore the scalability and sophistication of AI-enabled threats, continued enforcement actions, strengthened safeguards, and proactive security testing by providers reflect ongoing efforts to mitigate abuse and adapt defenses in response to increasingly AI-driven adversaries.
Sources
GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use
Read More
Article
Feb 12, 2026
2025 VMware ESXi Vulnerability Exploited by Ransomware Groups
Ransomware groups are actively exploiting CVE‑2025‑22225, a VMware ESXi arbitrary write vulnerability that allows attackers to escape the VMX sandbox and gain kernel‑level access to the hypervisor. Although VMware (Broadcom) patched this flaw in March 2025, threat actors had already exploited it in the wild, and CISA recently confirmed that threat actors are exploiting CVE‑2025‑22225 in active campaigns.
What’s Notable and Unique
Chinese‑speaking threat actors abused this vulnerability at least a year before disclosure, via a compromised SonicWall VPN chain.
Threat researchers have observed sophisticated exploit toolkits, possibly developed well before public disclosure, that chain this bug with others to achieve full VM escape. Evidence points to targeted activity, including exploitation via compromised VPN appliances and automated orchestrators.
Attackers with VMX level privileges can trigger a kernel write, break out of the sandbox, and compromise the ESXi host. Intrusions observed in December 2025 showed lateral movement, domain admin abuse, firewall rule manipulation, and staging of data for exfiltration.
CISA has now added CVE-2025-22225 to its Known Exploited Vulnerabilities (KEV) catalog, underscoring ongoing use by ransomware attackers.
Analyst Comments
Compromise of ESXi hypervisors significantly amplifies operational impact, allowing access to and potential encryption of dozens of VMs simultaneously. Organizations running ESXi 7.x and 8.x remain at high risk if patches and mitigations have not been applied. Therefore, clients are recommended to apply VMware patches from VMSA‑2025‑0004 across all ESXi, Workstation, and Fusion deployments. Enterprises are advised to assess their setups in order to reduce risk, as protecting publicly accessible management interfaces is a fundamental security best practice.
Sources
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks
The Great VM Escape: ESXi Exploitation in the Wild
VMSA-205-004: VMware ESXi, Workstation, and Fusion updates address multiple vulnerabilities (CVE-205-22224, CVE-2025-22225, CVE-2025-22226)
Read More
Article
Feb 5, 2026
Ransomware Trends & Data Insights: January 2026
Although Akira was once again the most active ransomware group in January, the threat landscape was more evenly distributed than it was throughout most of 2025. In December 2025, the three most active threat groups accounted for 57% of all ransomware and extortion activity; in January, the top three accounted for just 34%. Akira’s dominance also decreased to levels more consistent with early 2025, as the group was responsible for almost a third of all attacks in December but just 17% in January.
The number of unique ransomware and extortion groups observed in January increased slightly, to 17, up from 14 in December. It is too early to assess whether this trend will be the new normal for 2026. It is also worth noting that overall activity in January was lower than in previous months, consistent with what Arete typically observes at the beginning of a new year.

Figure 1. Activity from all threat groups in January 2026
Throughout the month of January, analysts at Arete identified several distinct trends behind the threat actors perpetrating cybercrime activities:
In January, Arete observed the reemergence of the LockBit Ransomware-as-a-Service (RaaS) group, which deployed an updated “LockBit 5.0” variant of its ransomware. LockBit first announced the 5.0 version on the RAMP dark web forum in early September 2025, coinciding with the group’s six-year anniversary. The latest LockBit 5.0 variant has both Windows and Linux versions, with notable improvements, including anti-analysis features and unique 16-character extensions added to each encrypted file. However, it remains to be seen whether LockBit will return to consistent activity levels in 2026.
The ClickFix social engineering technique, which leverages fake error dialog boxes to deceive users into manually executing malicious PowerShell commands, continued to evolve in unique ways in January. One campaign reported in January involved fake Blue Screen of Death (BSOD) messages manipulating users into pasting attacker-controlled code. During the month, researchers also documented a separate campaign, dubbed “CrashFix,” that uses a malicious Chrome browser extension-based attack vector. It crashes the web browser, displays a message stating the browser had "stopped abnormally," and then prompts the victim to click a button that executes malicious commands.
Also in January, Fortinet confirmed that a new critical authentication vulnerability affecting its FortiGate devices is being actively exploited. The vulnerability, tracked as CVE-2026-24858, allows attackers with a FortiCloud account to log in to devices registered to other account owners due to an authentication bypass flaw in devices using FortiCloud single sign-on (SSO). This recent activity follows the exploitation of two other Fortinet SSO authentication flaws, CVE-2025-59718 and CVE-2025-59719, which were disclosed in December 2025.
Source
Arete Internal
Read More
Article
Feb 2, 2026
New FortiCloud SSO Vulnerability Exploited
Fortinet recently confirmed that its FortiGate devices are affected by a new critical authentication vulnerability that is being actively exploited. The vulnerability, tracked as CVE-2026-24858, allows attackers with a FortiCloud account to log in to devices registered to other account owners due to an authentication bypass flaw in devices using FortiCloud single sign-on (SSO). CISA added the vulnerability to its Known Exploited Vulnerabilities catalogue and gave federal agencies just three days to patch, which requires users to upgrade all devices running FortiOS, FortiManager, FortiAnalyzer, FortiProxy, and FortiWeb to fixed versions. This recent activity follows the exploitation of two other SSO authentication flaws, CVE-2025-59718 and CVE-2025-59719, which were disclosed last month.
What’s Notable and Unique
There are strong indications that much of the recent exploitation activity was automated, with attackers moving from initial access to account creation within seconds.
As observed in December 2025, the attackers’ primary target appears to be firewall configuration files, which contain a trove of information that can be leveraged in future operations.
The threat actors in this campaign favor innocuous, IT-themed email and account names, with malicious login activity originating from cloud-init@mail[.]io and cloud-noc@mail[.]io, while account names such as ‘secadmin’, ‘itadmin’, ‘audit’, and others are created for persistence and subsequent activity.
Analyst Comments
This is an active campaign, and the investigation into these attacks is ongoing. Organizations relying on FortiGate devices should remain extremely vigilant, even after following patching guidance. With threat actors circumventing authentication, it’s crucial to monitor for and alert on anomalous behavior within your environment, such as the unauthorized creation of admin accounts, the creation or modification of access policies, logins outside normal working hours, and anything that deviates from your security baseline.
Sources
Administrative FortiCloud SSO authentication bypass
Multiple Fortinet Products’ FortiCloud SSO Login Authentication Bypass
Arctic Wolf Observes Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts
Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719
Read More



