Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Dec 12, 2019 | Updated Jan 15, 2024

HackTool:Win32/DefenderControl

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Microsoft researchers regularly see popular, publicly-available tools being leveraged by attackers. Defender Control, a publicly available software program allows users to one-click disable/enable Microsoft Defender Antivirus.

Threat actors use malware and publicly available software to tamper with security solutions. To run these tampering tools successfully against a system with Tamper Protection enabled, an attacker must have access to sufficient privileges to run the program as Trusted Installer, NT Authority, or System. Beginning in 2022, Microsoft introduced a functionality in Defender Antivirus that further limits the effectiveness of malicious antivirus tampering tools by not allowing the use of a trusted installer for service change or registry modification.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us