March 7, 2026

PBX Science

VoIP & PBX, Networking, DIY, Computers.

Hackers Can Disable Microsoft Defender on Windows 10/11 by Registering Fake Antivirus Software

Hackers Can Disable Microsoft Defender on Windows 10/11 by Registering Fake Antivirus Software



Hackers Can Disable Microsoft Defender on Windows 10/11 by Registering Fake Antivirus Software

Hackers have found a way to disable Microsoft Defender on Windows 10 and 11 by registering fake antivirus programs, giving them free rein to operate on compromised systems.

A security researcher operating under the alias es3n1n has developed a tool called Defendnot, which exploits this vulnerability to turn off Microsoft Defender.

Unsurprisingly, the tool has already been flagged by Microsoft as a trojan and is now quarantined.

Hackers Can Disable Microsoft Defender on Windows 10/11 by Registering Fake Antivirus Software

By default, Microsoft Defender is enabled on Windows 10/11. However, it automatically disables itself if it detects another antivirus solution—such as Kaspersky—installed on the system, in order to prevent software conflicts.

This behavior has previously prompted some developers to register fake antivirus software as a workaround to disable Defender. The motivation is often due to Defender’s high false-positive rate or its interference with activation scripts and other “crack” tools, leading many users to seek ways to disable it.

Hackers, of course, share the same goal—disabling Microsoft Defender gives them a much easier path to carry out malicious activities without being detected. Once Defender is out of the picture, attackers can act freely without worrying about security software blocking their actions.

One recent example involves a fake security application registered under the name “hello readme:)”. Researcher es3n1n released a tool named Defendnot that leverages a previously undocumented method using the Windows Security Center (WSC) API. This API allows antivirus software to notify Windows that a security product is already running, which in turn causes Defender to shut down automatically.

The release of Defendnot quickly went viral, but it was soon taken down following a DMCA complaint. That’s because simply invoking the WSC API isn’t straightforward—it typically requires using code from legitimate security software. In Defendnot’s initial version, it borrowed code from a real antivirus product and disguised a program named no-defender as a valid WSC-registered app. Once the original antivirus vendor discovered their code had been repurposed, they swiftly issued a takedown request.

In response, es3n1n rebuilt Defendnot from scratch using a custom “virtual antivirus” DLL. The updated version not only disables Microsoft Defender but also includes features like auto-start at boot, allowing it to run as soon as Windows launches.

Although Defendnot was developed primarily for research purposes—not for everyday users or malicious intent—it undeniably poses a security risk. Hackers could exploit the tool to compromise systems, raising concerns about potential misuse.

Microsoft’s threat intelligence team has already taken action. Defender now detects and quarantines Defendnot, classifying it as a Win32/Sabsik.FL.A!ml trojan—a designation for threats capable of performing a wide range of malicious actions on a device.

Hackers Can Disable Microsoft Defender on Windows 10/11 by Registering Fake Antivirus Software


Windows Software Alternatives in Linux


Disclaimer of pbxscience.com

PBXscience.com © All Copyrights Reserved. | Newsphere by AF themes.