Threat Actor Bypasses SentinelOne EDR Using Sophisticated Upgrade Exploit to Deploy Babuk Ransomware

Listen to this Post

Featured Image
In a recent cybersecurity incident, Aon’s Stroz Friedberg revealed an alarming new tactic used by a threat actor to bypass endpoint protections and successfully deploy Babuk ransomware. The attacker exploited a weakness in SentinelOne’s agent lifecycle management process, manipulating legitimate upgrade and downgrade functions to disable EDR defenses without tripping typical security alerts. This method represents a dangerous evolution in ransomware delivery techniques, showcasing the growing creativity and persistence of threat actors.

This incident did not rely on classic exploit tools or malicious drivers, but instead turned trusted, signed installer files into tools of subversion. The attackers didn’t need to break encryption or inject rootkits—they simply leveraged gaps in configuration and deployment workflows. This case emphasizes a larger issue within endpoint security: even well-secured environments can be left vulnerable when security controls are not properly configured or enforced by default.

Key Points and Developments from the Attack

Targeted Exploit: A threat actor exploited a known CVE in a public-facing server application, gaining local administrative privileges.
Abuse of Legitimate Tools: Instead of using malicious binaries, the attacker ran multiple legitimate SentinelOne agent upgrades and downgrades.
EDR Evaded via Process Lifecycle Exploit: This technique terminated SentinelOne’s protective processes temporarily, creating a vulnerability window.
No Driver Exploits: Unlike many EDR evasion methods, this tactic didn’t rely on malicious or vulnerable drivers, making it harder to detect.
MSI Exploit Confirmed: Testing showed that launching an upgrade or downgrade via .msi installer would shut down SentinelOne processes momentarily.
Double Downtime Trick: If msiexec.exe was killed mid-upgrade, neither the old nor the new agent would run—leaving systems completely unprotected.
Offline Disguise: From the management console’s perspective, the endpoint simply appeared offline, not compromised.
Multi-Version Vulnerability: The technique worked across several versions of the SentinelOne agent.
No Anti-Tamper Code Needed: The exploit bypassed SentinelOne’s tamper protection without requiring the removal code.
Defensive Weakness: The root vulnerability was that local users could independently run agent upgrades/downgrades.
Mitigation Strategy Introduced: SentinelOne now recommends using the “Online Authorization” feature to control all agent lifecycle actions from the central console.
Patch Not Enough Without Configuration: The central authorization feature wasn’t enabled by default on the affected systems at the time of attack.
Coordinated Industry Alert: SentinelOne and Stroz Friedberg confidentially disclosed the method to other EDR vendors.
Industry-Wide Reassurance: As of now, no other EDR platforms are known to be vulnerable to this attack if configured correctly.
Significance of Lifecycle Management: This incident places a spotlight on endpoint agent management as a crucial component of system hardening.
Audit Your Configs: Organizations are urged to review endpoint settings and ensure centralized control over updates is enforced.
Security is Not Just About Patches: It’s also about configuration hygiene and enforcing best practices proactively.
Agent Status Misinterpretation Risk: Offline status can now be a sign of successful exploitation, not just downtime.
Firewall and Task Modifications: Additional forensic signs included altered firewall rules and scheduled tasks, possibly used to aid lateral movement.
Attack Used No Sophisticated Malware: Just knowledge of the system’s upgrade behavior and timing.
Forensics Revealed Timeline: Logs showed install attempts, event anomalies, and system changes in a distinct sequence.
Silent Failure: The endpoint looked normal until deeper analysis revealed the exploitation pattern.
Proof of Sophistication: The attacker leveraged nuances of system behavior, not brute force or traditional hacking tools.
Need for Better Defaults: If central control had been default-enabled, the attack may not have succeeded.
System Behavior Must Be Watched: Abnormal process terminations or upgrades should trigger alerts.
Downgrade Attacks on the Rise: Downgrade exploits—long thought niche—are now becoming mainstream.
Babuk Still Active: Though considered past its prime, Babuk ransomware is clearly still in active use via new delivery vectors.
Industry Needs to Catch Up: Security vendors and enterprises must adapt faster to shifting attack strategies.

What Undercode Say:

This incident exemplifies a growing trend in cyberattacks: leveraging legitimate software behavior to bypass controls, often without relying on traditional malware signatures. What makes this attack so potent is its elegance—by merely using official SentinelOne installers and manipulating their behavior through process timing, the attacker created a stealthy window of vulnerability. The fact that this worked across multiple versions without requiring root-level tampering suggests a systemic design oversight in how lifecycle operations are handled.

The attacker’s strategy was surgical. They

This technique also highlights the growing risk of endpoint agents being treated as immutable or foolproof. Organizations tend to assume once an EDR agent is deployed, it’s working as expected unless it throws an alert. That assumption is exactly what threat actors exploit here. If no alerts are generated and the endpoint simply goes “offline,” admins may dismiss it as a network glitch rather than suspect sabotage.

Another core issue is configuration management. The “Online Authorization” feature offered by SentinelOne was effective at stopping the attack—but it wasn’t enabled by default. This shows that the right defenses often exist, but if not applied uniformly across all environments, they offer only partial protection. It underscores the importance of adopting secure configuration baselines and auditing them regularly.

This attack also puts pressure on EDR vendors to rethink how agent processes manage themselves. Should any security process ever be allowed to shut down silently during an update? Shouldn’t at least one watchdog process remain active until a successful handover is complete?

Furthermore, this event raises broader questions about insider threats. The attacker needed administrative privileges to execute the agent lifecycle changes. That implies either compromised credentials or an insider threat. EDR solutions must therefore include behavioral analytics that detect unusual admin actions—even if they use legitimate tools.

Lastly, the incident serves as a reminder of

To stay ahead, organizations must combine good tooling with strong operational discipline. Security isn’t just what’s installed—it’s how it’s configured, monitored, and understood.

Fact Checker Results:

Confirmed: The exploit method using SentinelOne agent lifecycle flaws was independently verified by forensic investigators.
Mitigation Exists: Enabling “Online Authorization” in SentinelOne effectively blocks this attack vector.
No Driver Exploits Used: This technique did not involve driver-based evasion, affirming its stealth and novelty.

Prediction:

With this method now public, copycat attacks are likely. Threat actors may begin targeting other EDR platforms to identify similar lifecycle process weaknesses. Organizations that do not centralize control of endpoint agents will be at elevated risk. Over the next year, we can expect both vendors and attackers to escalate this arms race, with lifecycle management becoming a prime focus of both defense strategies and exploit development. Proactive configuration reviews, central policy enforcement, and deeper forensic analysis of “offline” agents will become non-negotiable best practices.

References:

Reported By: cyberpress.org
Extra Source Hub:
https://www.stackexchange.com
Wikipedia
Undercode AI

Image Source:

Unsplash
Undercode AI DI v2

Join Our Cyber World:

💬 Whatsapp | 💬 Telegram