Vulnerabilities Allow Researcher to Turn EDR and AV Security Products Into Wipers
Dubbed Aikido, the researcher’s wiper abuses the extended privileges that EDR and AV products have on the system, relying on decoy directories containing specially crafted paths to trigger the deletion of legitimate files.