“Bring Your Own Installer” EDR Bypass Used in Ransomware Attack Targeting SentinelOne

A new “Bring Your Own Installer” bypass lets ransomware actors disable SentinelOne EDR protection by exploiting the agent upgrade process, leaving endpoints exposed to attack.
“Bring Your Own Installer” EDR Bypass Used in Ransomware Attack Targeting SentinelOne
Table of Contents
    Add a header to begin generating the table of contents

    New SentinelOne Ransomware Attack Bypasses EDR via Installer Exploit

    Security researchers from Aon’s Stroz Friedberg Incident Response team have uncovered a “Bring Your Own Installer” EDR bypass technique that was used in a real-world ransomware attack to disable SentinelOne’s tamper protection.

    The method allowed threat actors to terminate EDR services during the agent upgrade process, exposing devices to Babuk ransomware deployment. This discovery emerged during an incident response engagement earlier in 2025.


    How the “Bring Your Own Installer” Bypass Works

    Unlike traditional EDR bypass techniques that rely on third-party tools or drivers, this method abuses the legitimate SentinelOne Windows Installer.

    When an agent is upgraded, the SentinelOne installer automatically stops running services to overwrite files. Attackers exploit this window by launching a real installer and then forcefully terminating the installation after the services are disabled — but before the new version is installed. This leaves the device without active protection.

    The attack does not require specialized tools, making it accessible to adversaries with admin access.

    “We want to get the word out to ensure SentinelOne’s customers know to enable Local Upgrade protection,”
    John Ailes, Manager, Stroz Friedberg DFIR

    Bring Your Own Installer EDR bypass attack chain
    Source: Stroz Friedberg


    Exploited in Live Ransomware Incident

    Logs from a breached environment showed that attackers gained administrative access through a separate vulnerability, then executed this bypass technique to disable protections and deploy ransomware.

    “Further testing showed that the attack was successful across multiple versions of the SentinelOne agent,”
    Stroz Friedberg

    Even fully updated systems remain vulnerable if Online Authorization is not enabled. Once the installer is terminated mid-process, the device also drops offline from the SentinelOne management console, limiting visibility.


    SentinelOne’s Response and Mitigation Recommendations

    Stroz Friedberg privately disclosed the vulnerability to SentinelOne in January 2025. SentinelOne later notified customers and recommended enabling the “Online Authorization” setting, which requires console approval before any local agent upgrade, downgrade, or uninstall.

    This protection is not enabled by default for existing customers, but it is now activated by default in new installations.

    “While such local access poses similar threats to anti-tampering for these EDR products at large… we have no knowledge of any EDR vendor, including SentinelOne, that is currently impacted by this attack when their product is properly configured.”
    SentinelOne statement

    SentinelOne also confirmed:

    • The local agent passphrase is enabled by default to block unauthorized uninstalls.
    • The Local Upgrade Authorization (a.k.a. “Online Authorization”) is available to authenticate agent changes.
    • The attack can be prevented if either 1a or 1b protection is active.

    Other EDR Vendors Alerted

    SentinelOne shared the findings with other major EDR vendors as a precaution. Palo Alto Networks confirmed that its products are not affected.

    As of now, SentinelOne has not named any other vendors potentially impacted by this technique. BleepingComputer has reached out to the company for further comment.


    Summary

    This Bring Your Own Installer technique poses a serious risk by exploiting a normal part of EDR software behavior. Organizations using SentinelOne should verify that Online Authorization or Local Upgrade protection is enabled to block unauthorized tampering during upgrades. Without it, even updated agents may remain vulnerable to attack.

    Related Posts