Cyber News

Malware Payloads Deployed in the Wild Using Abused AV/EDR Evasion Framework

Elastic Security Labs has sounded the alarm after uncovering multiple active infostealer campaigns leveraging the commercial AV/EDR evasion framework SHELTER for malicious purposes.

Once marketed exclusively to offensive security professionals for red team simulation, SHELTER is now being abused by threat actors to bypass modern security tools and deploy a potent array of malware in the wild.

Shellter Elite Hijacked by Threat Actors

SHELTER, developed by the Shelter Project, was initially designed to help red teams stealthily deploy payloads for sanctioned security assessments.

Its commercial versions, Shellter Pro Plus and Shellter Elite boast advanced anti-detection capabilities.

However, Elastic Security Labs has traced a surge in infostealer campaigns packaging their payloads with Shellter Elite 11.0 since April 2025, following its recent release.


Activity Timeline

Despite the vendor’s safeguards, such as geographic sales restrictions and rigorous due diligence, at least one copy of Shelter Elite has fallen into the hands of criminals.

The tool’s advanced evasion tactics have made it a favorite for financially motivated cybercriminals, as evidenced by low detection rates on VirusTotal for SHELLTER-protected payloads and active resale offers on illicit forums.

Technical Deep Dive: Evasion Features and Loader Tactics

SHELTER-protected malware demonstrates several sophisticated anti-analysis and anti-detection mechanisms:

  • Polymorphic Junk Code: Payloads are obfuscated with self-modifying code, blending malicious and legitimate instructions to confuse static analysis tools.
  • System Module Unhooking: The loader maps clean copies of system DLLs (e.g., ntdll.dll) directly into memory, evading hooks set by security products.
  • AES Payload Encryption: Final malware payloads are protected with AES-128-CBC encryption and compressed using LZNT1, with decryption keys either embedded or fetched from remote servers.
  • DLL Preloading & Call Stack Evasion: Essential Windows DLLs are force-loaded in ways that corrupt the call stack, masking their origins and hindering behavioral detection.
  • Memory Scan Evasion & Indirect System Calls: Runtime decoding, memory permission tricks, and trampoline-based indirect system calls ensure a minimal forensic footprint.
  • AMSI Bypass: The loader corrupts the Windows Antimalware Scan Interface using patching and advanced COM-hijacking techniques, disabling script scanning, and instrumentation.

Elastic researchers have also noted license checks and unique expiry “kill switches” embedded in illicit samples hinting a single stolen elite license is behind most recent attacks.

Campaigns and Defender Response

Among the most prominent threats are LUMMA, RHADAMANTHYS, and ARECHCLIENT2 infostealers, all of which are observed using Shellter-protected launchers.

Notably, distribution channels include phishing lures, booby-trapped YouTube links, and file-sharing sites like MediaFire.

To support defenders, Elastic Security Labs has released a dynamic unpacker for SHELLTER-protected binaries, along with accompanying YARA rules, urging organizations to update their detection mechanisms.

The firm warns that as threat actors further integrate advanced red team tools, defenders must anticipate rapid evolution in evasion techniques.

The leakage of commercial offensive security tools, such as SHELLTER, into the hands of criminals marks a dangerous escalation in malware sophistication, forcing the cybersecurity community to focus on rapid detection, analysis, and mitigation of these advanced threats.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago