Skip to content
Threat Feed
high advisory

Windows Defender SpyNet Reporting Disabled via Registry Modification

Attackers disable Windows Defender SpyNet reporting by modifying specific registry keys, preventing telemetry data from being sent and allowing malicious activities to go undetected.

Attackers are increasingly targeting Windows Defender’s telemetry reporting to evade detection. Disabling SpyNet reporting is achieved by modifying specific registry keys associated with Windows Defender settings. This activity, if successful, prevents Windows Defender from sending telemetry data to Microsoft, hindering the detection of malicious activities and enabling attackers to operate undetected. This behavior has been observed in conjunction with malware such as IcedID and Qakbot, often as a precursor to ransomware deployment. This technique is significant because it undermines the effectiveness of endpoint detection and response (EDR) solutions, allowing attackers to maintain persistence and carry out further attacks without raising alarms.

Attack Chain

  1. Initial access is gained through an exploit or social engineering, delivering an initial payload.
  2. The initial payload executes, establishing a foothold on the system.
  3. The attacker attempts to disable Windows Defender SpyNet reporting by modifying the registry.
  4. The registry key HKLM\SOFTWARE\Microsoft\Windows Defender\SpyNet\SpynetReporting is set to 0x00000000.
  5. The attacker verifies that Windows Defender SpyNet reporting is successfully disabled.
  6. With SpyNet reporting disabled, the attacker deploys malware such as IcedID or Qakbot.
  7. The deployed malware performs lateral movement and privilege escalation within the network.
  8. The attacker ultimately deploys ransomware, encrypting critical systems and demanding ransom payment.

Impact

Successful disabling of Windows Defender SpyNet reporting can lead to a significant increase in dwell time and a higher likelihood of successful ransomware deployment. Organizations that fail to detect this activity may experience widespread encryption of systems, data exfiltration, and significant financial losses. The DFIR Report documented instances where IcedID led to XingLocker ransomware deployment within 24 hours after initial compromise, highlighting the speed and severity of such attacks. CISA has also warned about similar campaigns.

Recommendation

  • Enable Sysmon EventID 13 to monitor registry modifications as described in the search query.
  • Deploy the Sigma rule Registry Modification to Disable Windows Defender SpyNet Reporting to your SIEM and tune for your environment.
  • Investigate any alerts generated by the Sigma rule, prioritizing systems where other suspicious activities have been observed.
  • Review and harden registry permissions to prevent unauthorized modifications to critical Windows Defender settings.
  • Ensure that the official Sysmon TA is at least version 2.0.

Detection coverage 2

Registry Modification to Disable Windows Defender SpyNet Reporting

high

Detects modification of the registry to disable Windows Defender SpyNet reporting by monitoring changes to the registry path associated with Windows Defender SpyNet settings.

sigma tactics: defense_evasion sources: registry_set, windows

Process Modifying Windows Defender SpyNet Registry

medium

Detects processes modifying the Windows Defender SpyNet registry keys.

sigma tactics: defense_evasion sources: registry_set, windows

Detection queries are kept inside the platform. Get full rules →