
A new malware campaign known as BlackSanta is actively targeting HR and recruitment personnel through realistic job‑related lures and weaponized documents. Once victims open malicious files, the malware deploys a highly capable EDR‑killer designed to disable endpoint protection before delivering additional payloads. Read the Cybersecurity Threat Advisory now to protect you and your clients’ environments.
What is the threat?
BlackSanta is a multi‑stage malware campaign that relies on social engineering to gain an initial foothold and then swiftly neutralizes endpoint security controls. Attackers impersonate job applicants or recruiters, often referencing real open roles to appear credible. Emails typically contain malicious ZIP archives, ISO images, or documents presented as resumes or portfolios. When opened, these files use embedded shortcuts, scripts, or loaders that abuse trusted Windows components such as mshta.exe, wscript.exe, or rundll32.exe to blend in with normal system activity.
After initial execution, BlackSanta runs a loader and privilege‑escalation phase. It performs environment checks to identify installed antivirus or EDR products and determines user privilege levels. If administrative access is lacking, it attempts escalation through token impersonation, UAC bypasses, or misconfigured services.
Once elevated, the malware executes its most critical capability: EDR suppression. Using a bring‑your‑own‑vulnerable‑driver (BYOVD) technique or abused signed drivers, it gains kernel‑level access to terminate protected processes, disable monitoring, and block telemetry.
With defenses blinded, BlackSanta establishes persistence through scheduled tasks, registry run keys, or service entries that mimic legitimate system components. The compromised host then becomes a staging point for additional payloads—such as credential stealers, remote access tools, or lateral movement frameworks—allowing attackers to steal credentials, inspect network shares, and pivot across the environment with limited risk of detection.
Why is it noteworthy?
This campaign stands out for its deliberate focus on disabling EDR solutions early in the attack chain—behavior more commonly associated with advanced and well‑resourced threat actors. By eliminating endpoint visibility, BlackSanta significantly increases attacker dwell time and amplifies potential impact.
What is the exposure or risk?
Organizations face a high risk of stealthy endpoint compromise when HR or recruitment staff execute malicious files tied to this campaign. A successful infection can lead to:
- Disabled endpoint and security controls
- Credential theft and unauthorized access
- Lateral movement within internal networks
- Long‑term persistence and data exfiltration
- Increased likelihood of ransomware or large‑scale breaches
Because BlackSanta suppresses EDR visibility, compromised systems may remain undetected for extended periods.
What are the recommendations?
Barracuda strongly recommends the following defensive measures:
- Restrict execution of archives, ISOs, and scripts received via email—especially for HR teams.
- Implement advanced attachment sandboxing and block uncommon file types used in job‑application lures.
- Ensure protections are active and controlled by strong administrative safeguards.
- Watch for suspicious or vulnerable driver loads and enforce driver blocklists where possible.
- Provide focused training for HR personnel on resume‑based phishing and social engineering.
- Look for indicators of EDR termination, disabled services, or abnormal privilege escalation.
- Limit local admin access to reduce the malware’s ability to disable security tools.
References
For more in-depth information about the recommendations, please visit the following links:
If you have any questions about this Cybersecurity Threat Advisory, don’t hesitate to get in touch with Barracuda Managed XDR’s Security Operations Center.
This post originally appeared on Smarter MSP.

