The GMER tool is an anti-rootkit utility designed to detect and remove hidden processes, services, files, and registry keys associated with rootkits. However, recent threat intelligence indicates that multiple ransomware operators are abusing GMER to disable security products before deploying ransomware or performing data exfiltration.
Threat Overview
Observed Abuse
Attackers have been leveraging the GMER tool to terminate security product services and processes prior to launching payloads. Various threat actors have been confirmed to use GMER in their ransomware campaigns, including
Threat research teams at Broadcom have observed multiple pre-ransomware activities involving GMER where it was used to neutralize defences, thereby enabling:
Current Status
Action Plan:
If you wish to use the GMER tool (gmer.exe), add one of the following exclusions for the respective products:-
Reference Articles:-
For Symantec Endpoint Security (SES) - Adding Allow List policy scan exceptions
For Symantec Endpoint Protection (SEP) - Configuring Exceptions policies in Endpoint Protection Manager
For Carbon Black Cloud (CBC) - Setting up Exclusions in the Carbon Black Cloud Console for AV Products
For Carbon Black EDR (CB EDR) - Create Exclusions