Home OSINT News Signals
CYBER

'BlackSanta' Campaign Hijacks HR Workflows to Deploy Stealthy EDR-Killing Malware

đź•“ 1 min read

A sophisticated cyber-espionage campaign, attributed to Russian-speaking threat actors, is leveraging a novel attack vector: corporate human resources workflows. Dubbed "BlackSanta," this operation infiltrates organizations by compromising HR processes to deliver a powerful malware payload specifically engineered to disable Endpoint Detection and Response (EDR) solutions. By neutralizing these critical security tools, the attackers create a stealthy environment where they can conduct data exfiltration and lateral movement without raising alarms. This method represents a significant evolution in attack tradecraft, moving beyond traditional phishing to exploit trusted internal business systems.

The attack chain begins with the initial compromise of HR departments or the systems they use. Threat actors likely use targeted phishing or exploit vulnerabilities in HR software to gain a foothold. Once inside, they manipulate legitimate HR workflows—such as new employee onboarding, software provisioning, or policy update distributions—to deliver malicious files. These files are disguised as routine HR documents or necessary software installers, increasing the likelihood that employees will execute them without suspicion. This abuse of trusted internal channels significantly bypasses standard email security gateways and user vigilance.

The core payload of the BlackSanta campaign is a sophisticated "EDR killer" malware. This tool is designed with deep knowledge of security product architectures, employing techniques to surgically disable or bypass EDR agents on infected endpoints. Methods may include terminating security processes, unloading drivers, deleting or corrupting configuration files, and exploiting legitimate administration tools like PsExec for malicious purposes. With the EDR solution blinded or completely removed, the attackers deploy secondary payloads, such as information stealers or backdoors, to harvest sensitive corporate data from finance, R&D, and executive communications.

The ultimate goal of this campaign is sustained, undetected data theft. By hijacking HR workflows, the attackers gain a pervasive and trusted delivery mechanism. By deploying EDR-killing malware first, they ensure their subsequent activities remain invisible to security teams. This dual-pronged approach—abusing trust and eliminating visibility—makes BlackSanta a formidable threat. Organizations are urged to enhance monitoring of HR system access, implement application allowlisting to prevent unauthorized software execution, and segment HR networks from critical data repositories. Vigilance against unusual process terminations or EDR service failures is also critical for early detection of such advanced attacks.

Telegram X LinkedIn
Back to News