BYPASSING EDR COMBINED WITH SIEM: ANALYSIS OF ATTACK CONCEALMENT TECHNIQUES IN LOGS – A STUDY OF ADVERSARIAL TACTICS FOR DETECTION EVASION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.29.865

Keywords:

Endpoint Detection and Response, Security Information and Event Management, detection evasion, log manipulation, slow attacks, event flooding, Living-off-the-Land, code obfuscation, unhooking, kernel-level attacks, DKOM, BIOS/UEFI, behavioral analytics, cross-platform telemetry, correlation, cyber threats, PowerShell, WMIC, CertUtil

Abstract

This article addresses a highly relevant cybersecurity issue — methods for bypassing Endpoint Detection and Response (EDR) systems in combination with Security Information and Event Management (SIEM) platforms, which are key components of modern cyber defense infrastructure. Despite the continuous evolution of these technologies, attackers develop tactics to evade detection and maintain persistence in compromised systems. The paper presents a classification of evasion techniques, including log manipulation, event spoofing, disabling logging services, and low-frequency attacks that remain below alert thresholds.

Special attention is given to tactics based on the "Living-off-the-Land" (LotL) concept — leveraging built-in operating system tools (e.g., PowerShell, WMIC, CertUtil) to execute malicious code with minimal indicators of compromise. Obfuscation techniques such as junk code injection, encryption, recompilation, and the use of custom loaders are analyzed for their ability to evade both signature-based and heuristic detection engines.

The paper also explores kernel-level attack methods, including Direct Kernel Object Manipulation (DKOM), DLL unhooking, and firmware-level intrusions via UEFI/BIOS modifications, which allow attackers to operate outside the monitored OS environment. Furthermore, the study examines SIEM evasion methods such as log wiping, timestamp tampering, sensor overload, and alert flooding — all of which aim to degrade analyst effectiveness and reduce detection fidelity.

Real-world examples are provided using popular platforms such as Elastic, Splunk, CrowdStrike, and SentinelOne. The authors conclude by emphasizing the importance of behavioral analytics, long-term correlation, cross-platform telemetry, and machine learning models as essential strategies for countering sophisticated evasion techniques and ensuring threat visibility in hybrid IT environments.

Downloads

Download data is not yet available.

References

Whisper2Shout – Unhooking Technique. (n.d.). https://www.secforce.com/blog/whisper2shout-unhooking-technique/

First UEFI Rootkit Detected in the Wild. (n.d.). https://eset.ua/download_files/marketing/Releases/lojax_

whitepaper.pdf

Turla Rootkits. (n.d.). https://uk.wikipedia.org/wiki/Turla_

Junk Code Insertion. (n.d.). https://www.researchgate.net/figure/Function-Splitting_fig3_371581054

Coccinelle Basic Documentation. (n.d.). https://docs.zephyrproject.org/latest/develop/tools/coccinelle.html

Coccinelle Basic Documentation. (n.d.). https://docs.zephyrproject.org/latest/develop/tools/coccinelle.html

Splunk Documentation. (n.d.). https://docs.splunk.com/Documentation/Splunk/9.4.1/Overview/About

SplunkEnterprise

Elastic Cloud Documentation. (n.d.). https://www.elastic.co/docs/deploy-manage/deploy/elastic-cloud/cloud-hosted

Computrace BIOS Trojan. (n.d.). https://novikov.ua/bios-%D0%BD%D1%8B%D0%B9-%D1%82%D1%80%D0%BE%D1%8F%D0%BD-%D0%BE%D1%82-absolute-software-computrace/

DLL Unhooking. (n.d.). https://unprotect.it/technique/dll-unhooking/

SOC Burnout. (n.d.). https://medium.com/infosec-ninja/sos-for-your-soc-how-to-prevent-burnout-and-boost-retention-7c053b5b71ce

SOC Burnout. (n.d.). https://medium.com/infosec-ninja/sos-for-your-soc-how-to-prevent-burnout-and-boost-retention-7c053b5b71ce

Exploring the Hidden Switches of Certutil and Certreq. (n.d.). https://www.encryptionconsulting.com/exploring-the-hidden-switches-of-certutil-and-certreq/

WMIC Guide. (n.d.). https://learn.microsoft.com/ru-ru/windows/win32/wmisdk/wmic

HookChain: A New Perspective for Bypassing EDR Solutions. (n.d.). https://arxiv.org/abs/2404.16856

Defeating EDR-Evading Malware with Memory Forensics. (n.d.). https://www.volexity.com/wp-content/uploads/2024/08/Defcon24_EDR_Evasion_Detection_White-Paper_Andrew-Case.pdf

AV Bypass Techniques through an EDR Lens. (n.d.). https://blog.f-secure.com/av-bypass-techniques-through-an-edr-lens/

Evolution of Endpoint Detection and Response (EDR) in Cyber Security: A Comprehensive Review. (n.d.). https://www.e3s-conferences.org/articles/e3sconf/abs/2024/86/e3sconf_rawmu2024_01006/

Effectiveness of Endpoint Detection and Response Solutions in Combating Modern Cyber Threats. (n.d.). https://polarpublications.com/index.php/JACSTIC/article/view/1

Bypassing Antivirus Detection: Old-School Malware, New Tricks. (n.d.). https://arxiv.org/abs/2305.04149

XDR: The Evolution of Endpoint Security Solutions – Superior Extensibility and Analytics to Satisfy the Organizational Needs of the Future. (n.d.). https://www.researchgate.net/publication/354190628_XDR

_The_Evolution_of_Endpoint_Security_Solutions_-Superior_Extensibility_and_Analytics_to_Satisfy_

the_Organizational_Needs_of_the_Future

A Taxonomy of Software Obfuscation Techniques for Layered Security. (n.d.). https://cybersecurity.springeropen.com/articles/10.1186/s42400-020-00049-3

Downloads


Abstract views: 26

Published

2025-09-26

How to Cite

Opirskyy, I., Dzoban, T., & Vasylyshyn, S. (2025). BYPASSING EDR COMBINED WITH SIEM: ANALYSIS OF ATTACK CONCEALMENT TECHNIQUES IN LOGS – A STUDY OF ADVERSARIAL TACTICS FOR DETECTION EVASION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 8–26. https://doi.org/10.28925/2663-4023.2025.29.865

Most read articles by the same author(s)

1 2 > >>