ForumsExploitsDRILLAPP & Edge Debugging: Laundry Bear's Latest Stealth Tactic

DRILLAPP & Edge Debugging: Laundry Bear's Latest Stealth Tactic

BlueTeam_Alex 3/16/2026 USER

Has anyone else dug into the LAB52 report regarding the DRILLAPP backdoor? It looks like UAC-0190 (Laundry Bear / Void Blizzard) is shifting tactics again, specifically targeting Ukrainian entities throughout February 2026. The standout feature here isn't just the payload, but the C2 mechanism abusing Microsoft Edge's remote debugging protocol.

By spawning instances of msedge.exe with debugging flags enabled, the actors can mask malicious traffic as standard browser activity. This makes network detection significantly harder since the traffic looks like legitimate web browsing over WebSockets. Given the tactical overlap with previous campaigns against defense forces, this seems to be a refinement of their espionage toolkit designed to evade heuristic detection.

Detection Ideas: You'll want to hunt for Edge processes spawned with non-standard arguments. Here is a quick PowerShell snippet to check your endpoints for suspicious command lines:

Get-WmiObject Win32_Process | Where-Object {$_.Name -eq 'msedge.exe'} | Select-Object ProcessId, @{Name='CmdLine';Expression={$_.CommandLine}} | Where-Object {$_.CmdLine -match '--remote-debugging'}


For those using Sentinel/MDE, this KQL query might help flag the behavior by looking for the specific debug port argument:
DeviceProcessEvents
| where FileName == "msedge.exe"
| where ProcessCommandLine has_any ("--remote-debugging-port", "--remote-allow-origins")
| project Timestamp, DeviceName, InitiatingProcessFileName, ProcessCommandLine


I'm curious if anyone has seen attempts to leverage this debug protocol outside of this specific campaign. It feels like a technique that could easily pivot to corporate environments for data exfiltration if left unchecked. How are you handling browser debug policies in your orgs?
CL
CloudOps_Tyler3/16/2026

Solid breakdown. We actually caught a similar variant during a red team exercise last year using Chrome's debug protocol, but moving it to Edge is clever because it's often trusted implicitly by internal proxies.

One thing to add: Check the parent process. Legitimate user browsing usually comes from explorer.exe or a taskbar shortcut. If you see msedge.exe with debug flags spawned by powershell.exe or a signed binary like mshta.exe, that's your red flag.

Also, consider blocking port 9222 on egress unless strictly necessary for dev work.

RA
RansomWatch_Steve3/16/2026

Great catch on the KQL query. We've added a hunting rule for this immediately.

Just a note from the sysadmin side: You can actually disable remote debugging via Group Policy if you aren't using it for dev purposes. The setting is under Computer Configuration > Administrative Templates > Microsoft Edge > Allow remote debugging. Setting it to 'Disabled' kills this vector at the root for managed endpoints.

Verified Access Required

To maintain the integrity of our intelligence feeds, only verified partners and security professionals can post replies.

Request Access

Thread Stats

Created3/16/2026
Last Active3/16/2026
Replies2
Views43