Cybersecurity researchers from Workday’s Offensive Security team have uncovered a stealthy new technique that allows attackers to bypass Endpoint Detection and Response (EDR) systems by performing raw disk reads on Windows devices. This method renders traditional defenses blind to credential theft and system compromise.
Instead of triggering standard API calls monitored by EDR tools (like opening a file by name), attackers read disk sectors directly via low-level drivers.
EDRs typically don’t flag such operations, since they appear as harmless sector reads. Once attackers capture data, they reconstruct files, such as SAM.hive or NTDS.dit, by parsing NTFS structures, starting from the Master Boot Record and navigating through the Master File Table.
Workday demonstrated this technique using a vulnerable driver (CVE-2025-50892), though elevated privileges and standardized Windows drivers like disk.sys or storport.sys already offer similar sector-level access.
This raw disk read attack sidesteps common security controls:
Workday’s experts urge a defense-in-depth strategy to close this blind spot:
As attackers operate increasingly outside the visibility of especially file-based EDR tools, organizations must evolve their defensive strategies beyond standard approaches. Implementing multiple layers of protection is essential to stay ahead in the cybersecurity arms race.