Inside Crypto24: Custom EDR-Blinding and Google Drive Exfiltration in Recent Ransomware Intrusions
Ransomware crews continue to professionalize. The latest example, Crypto24, blends custom endpoint-defense blinding, stealthy persistence, and public-cloud exfiltration to quietly prepare environments for high-impact encryption events. This post breaks down what’s known and translates it into concrete detection and response guidance for blue teams.
Background
On August 14, 2025 reported on Crypto24 operations tracked by Trend Micro, noting intrusions against large organizations across the United States, Europe, and Asia in sectors including finance, manufacturing, entertainment, and technology. The reporting highlights a post-compromise playbook that activates or creates administrative accounts, establishes multiple persistence mechanisms, evades endpoint detection and response (EDR), moves laterally via SMB, exfiltrates data to Google Drive, and finally deletes shadow copies before encryption.
Technical Analysis
Initial foothold and staging. After gaining access (vector undisclosed), operators enable default administrative accounts or create new local admins to ensure durable control. Reconnaissance is performed via batch scripts that enumerate users, hardware, and disk layout.
Persistence and tooling. Two notable Windows services are installed: WinMainSvc (a keylogger masquerading as “Microsoft Help Manager”) and MSRuntime (a ransomware loader). Staged
payloads are deployed and scheduled tasks are configured for reliability.
EDR evasion with custom RealBlindingEDR. A modified variant of the open-source RealBlindingEDR is used to identify security vendors from driver metadata and disable kernel-level callbacks, effectively “blinding”
agents from multiple vendors (reports list targets including Trend Micro, Kaspersky, Sophos, SentinelOne, Malwarebytes, Cynet, McAfee, Bitdefender, Broadcom/Symantec, Cisco, Fortinet, and Acronis). In some cases, the actors
execute Trend Micro’s legitimate XBCUninstaller.exe—observed launched via gpscript.exe—to remove Trend Vision One components before staging follow-on payloads.
Data theft and encryption. Exfiltration uses a custom tool leveraging the WinINET API to push data to Google Drive. Prior to detonation, the operators delete volume shadow copies to hinder recovery, then execute the ransomware payload.
End-to-end flow (high level).
[Initial Access]
[Privilege Establishment] - enable default admin / create local admin
[Recon] - batch enumeration (accounts, hardware, disks)
[Persistence] - Service: WinMainSvc (keylogger) - Service: MSRuntime (loader)
[EDR Evasion] - Custom RealBlindingEDR disables kernel callbacks - Optional uninstall via XBCUninstaller.exe (via gpscript.exe)
[Lateral Movement] - SMB shares
[Exfiltration] - Google Drive via WinINET
[Impact] - Delete VSS - Encrypt\n
Impact & Implications
Crypto24’s approach undermines the core visibility assumptions many enterprises place on EDR. By targeting kernel driver callbacks and opportunistically uninstalling agents, defenders may experience blind spots precisely during staging and lateral movement. Because the tooling is vendor-agnostic and relies on legitimate binaries where possible, organizations across multiple sectors and EDR ecosystems are potentially exposed. Public-cloud exfiltration via Google Drive blends in with common business workflows, complicating egress-based detections.
Defensive Recommendations
Hardening & prevention
- Enable and enforce EDR tamper protection and ensure agents require strong credentials or hardware-backed controls for uninstallation or driver changes.
-
Restrict execution of administrative tools (e.g.,
gpscript.exe, vendor uninstallers likeXBCUninstaller.exe) via AppLocker/WDAC; allow only signed and explicitly approved paths and hashes. - Kernel driver protections: block or alert on unsigned/unknown drivers and changes to callback registrations; require admin + code integrity for driver loads.
- Service creation controls: limit who can install services; monitor for suspicious names such as
WinMainSvcandMSRuntime. - Cloud egress governance: brokered access to Google Drive; enforce CASB/DLP and OAuth app controls; alert on anomalous uploads at scale.
Detection ideas (Windows Security + Sysmon)
- Service installation: Windows Security
4697and System7045whereServiceName in ("WinMainSvc","MSRuntime")or unusual binary paths. -
Process creation: Event
4688/ Sysmon1forgpscript.exespawningXBCUninstaller.exe; unusual parent-child chains involving EDR uninstallers or administrative tools. - Driver tampering: Sysmon
6 (DriverLoad)for non-standard or unsigned drivers; alert on processes enumerating or modifying kernel callbacks. - Shadow copy deletion: Command lines invoking
vssadmin delete shadows,wmic shadowcopy delete, or equivalent PowerShell. - Google Drive exfiltration: proxy/DNS for high-volume drive.google.com uploads from servers or non-user endpoints; Sysmon
3network connections to Drive during off-hours. - Registry & autoruns: Sysmon
13(RegistryValueSet) for service persistence keys and suspicious Run/Services entries tied to keylogger/loader modules.
IR playbook pointers
- Hunt for newly enabled/default admin accounts and recent
net localgroup administratorschanges. - Inventory recent service creations; quarantine binaries and capture memory from hosts that created
WinMainSvcorMSRuntime. - Block and rotate credentials used on any host exhibiting EDR tampering or agent removal.
- Review OAuth grants and audit logs for Google Drive; revoke suspicious tokens; enforce domain-restricted Drive sharing.
Conclusion
Crypto24 exemplifies a broader trend: ransomware actors are normalizing kernel-level EDR interference and cloud-native exfiltration ahead of encryption. Defenders should assume temporary telemetry loss during the most critical phases of an intrusion and layer controls accordingly—hardware-backed tamper protection, strict application control for admin tooling, kernel-driver visibility, and egress governance for sanctioned cloud apps. If your detections still assume the EDR is always watching, it’s time to recalibrate.