
In the ongoing battle between cybersecurity measures and cybercriminals, a new technique has surfaced that allows attackers to bypass Endpoint Detection and Response (EDR) systems without needing elevated administrative privileges. Typically, evading such systems traditionally requires admin rights, making this new method a significant threat. The attackers ingeniously use masquerading and path obfuscation to disguise malicious payloads as legitimate processes,