HomeScience & EnvironmentDefendnot tool can silently...

Defendnot tool can silently disable Microsoft Defender without using malware

All modern Windows PCs come with Microsoft Defender built in. For the unaware, this tool is Windows’ native antivirus. 

Over time, it has matured into a reliable security tool capable of blocking a wide range of threats. However, a tool called Defendnot can shut down Microsoft Defender completely, without exploiting a bug or using malware. It simply convinces Windows that another antivirus is already running.

The implications are serious. This tool does not break into the system or use advanced code injection. It uses Windows features the way they were designed to be used. And that makes the problem harder to detect and harder to fix.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Windows software on a PC (Kurt “CyberGuy” Knutsson)

The tool works by pretending to be an antivirus

Windows is built to avoid running multiple antivirus products at once. When a third-party antivirus registers itself, Windows disables Microsoft Defender to prevent conflicts. Defendnot exploits this system using an undocumented API that security software uses to communicate with the Windows Security Center.

The tool registers a fake antivirus that appears legitimate to the system. It uses a dummy DLL and injects it into Task Manager, a trusted Windows process. By operating inside this signed process, Defendnot avoids signature checks and permission blocks. Once the fake antivirus is registered, Windows disables Microsoft Defender without warning or confirmation.

WINDOWS 10 SECURITY FLAWS LEAVE MILLIONS VULNERABLE

No security alert is shown to the user. No visible changes are made to indicate that the system is unprotected. Unless someone checks manually, the machine remains open to attacks with no real-time protection running.

The tool also includes options to set a custom antivirus name, enable logging and configure automatic startup. It achieves persistence by creating a scheduled task that runs whenever the user logs in.

person typing on laptop

Windows software on a laptop (Kurt “CyberGuy” Knutsson)

WINDOWS DEFENDER VS ANTIVIRUS SOFTWARE: FREE PROTECTION FALLS SHORT

From GitHub takedown to a fresh build

Defendnot is based on an earlier project called No-Defender. That project used code from an actual antivirus product to fake registration. It gained attention quickly and was removed after a copyright complaint from the vendor whose code had been reused. The developer took the project down and walked away from it.

With Defendnot, the creator rebuilt the core features using original code. This version avoids copyright issues and uses a new method to achieve the same effect. It does not rely on another antivirus or third-party binaries. It was written from scratch to demonstrate how simple it is to manipulate Windows security from inside the system.

Microsoft Defender currently flags the tool as a threat. It detects and quarantines it under the name Win32/Sabsik.FL.!ml. However, the fact that it works at all points to a weakness in how Windows handles antivirus registration and trust.

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

laptop on a desk

Windows laptop showing the home screen (Kurt “CyberGuy” Knutsson)

DOUBLECLICKJACKING HACK TURNS DOUBLE-CLICKS INTO ACCOUNT TAKEOVERS

6 ways to protect yourself from malicious programs

While Defendnot is a research project, there’s a chance that similar tools are already out there and could be used to compromise your PC. Here are a few tips to help you stay safe:

1. Use strong antivirus software: Even with regular updates, Windows systems can be left exposed by tools like Defendnot that silently disable built-in defenses. A strong third-party antivirus with real-time protection and frequent updates provides essential backup security. Look for solutions with real-time protection and frequent updates to tackle emerging threats. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

2. Limit exposure: Many exploits rely on user interaction, such as clicking a shady link, downloading a compromised file or mounting an untrusted virtual disk. Stick to reputable websites, avoid opening unsolicited email attachments and use a browser with built-in security features (like Microsoft Edge or Chrome with Safe Browsing enabled).

3. Avoid running unexpected commands: Never paste or run commands (like PowerShell scripts) you don’t understand or that were copied from random websites. Attackers often trick users into unknowingly running malware this way.

4. Keep your software updated: Regularly update your operating system, browsers and all software applications. Updates often include patches for security vulnerabilities that malware can exploit.

5. Use two-factor authentication (2FA): Enable 2FA on all your accounts. This adds an extra layer of security by requiring a second form of verification, making it harder for attackers to gain access even if they have your password.

6. Invest in personal data removal services: Even with strong device security, your personal information may still be exposed online through data brokers and people-finder sites. These services collect and publish details like your name, address and phone number, making you an easier target for identity theft or phishing. Automated data removal services track down these sites and submit removal requests on your behalf, helping to reduce your digital footprint and increase your online anonymity. While they can’t erase every trace of your information, they make it significantly harder for attackers to find and exploit your personal data, which saves you time and reduces unwanted spam in the process.

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

Get a free scan to find out if your personal information is already out on the web.

RELENTLESS HACKERS ABANDON WINDOWS TO TARGET YOUR APPLE ID

Kurt’s key takeaway

Defendnot points to a bigger issue with how Windows handles security. It takes a feature meant to prevent software conflicts and turns it into a way to completely disable protection. The system assumes any registered antivirus is legitimate, so if attackers can fake that, they get in without much resistance.

We often think of security as blocking the bad and trusting the good. But this case shows what happens when that trust is misplaced. Defendnot doesn’t sneak past Windows defenses. It walks right in using valid credentials. The solution isn’t just more patches or stronger malware signatures. What we need is a smarter way for systems to tell what is actually safe.

CLICK HERE TO GET THE FOX NEWS APP

Do you think companies like Microsoft need to rethink how Windows handles antivirus registration and trust, given that tools like Defendnot can so easily disable built-in protections without using malware or exploiting a bug? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Source link

- A word from our sponsors -

spot_img

Most Popular

More from Author

- A word from our sponsors -

spot_img

Read Now

Billy Bob Thornton on the return of “Landman”

Billy Bob Thornton's irreverence mixes with his Southern charm like a good ol' whiskey sour. After all, he can deliver lines with a sincerity that is almost mocking. He even, with a wink and a nod, played a not-so-saintly St. Nick. Some saw...

Compensation For Delay In Flat Possession Not Taxable Under Section 50C, Rules Mumbai ITAT | Tax News

Last Updated:November 09, 2025, 16:43 ISTMumbai ITAT rules compensation for flat delivery delays is not taxable under Section 50C. Experts say this offers relief to taxpayers facing project delays.Section 50C Can’t Apply Without Actual Property Transfer, Rules Mumbai ITATIn a significant ruling, the Mumbai bench of the...

Optical illusion: Only 1% of people can spot the hidden face in this burger. Can you?

Optical illusions have gained a lot of popularity recently, as they get our brain to exercise, and can be the perfect test of our observational skills and keen eye. They are also super fun to solve, and can be the perfect recipe for a bored...

Dolly Parton leans on music industry for support amid health scares: Source

Dolly Parton has reportedly been finding comfort in the company of fellow music artists during a challenging period for...

Rs 1 lakh Crore Fund To Mitigate R&D Risks, Spur Private Investment In Cutting-Edge Technologies: Secretary DST | Economy News

New Delhi: The recently launched Rs 1 lakh crore Research Development and Innovation (RDI) fund, particularly focused on India's private sector, aims to support the private research and innovation mindset among players and mitigate the financial risks associated with it.   Speaking at a workshop organised by the Department...

With presidents and royalty in attendance, Egypt unveils $1bn cultural ‘GEM’

Prime ministers, presidents and royalty descended on Cairo on Saturday to attend the spectacle-laden inauguration of a sprawling new...

Obituary: James Watson

Getty ImagesIn February 1953, two men walked into a pub in Cambridge and announced they had found "the secret of life". It was not an idle boast.One was James Watson, an American biologist from the Cavendish laboratory; the other was his British research partner, Francis Crick....

T Rabi Sankar: Frauds up since July, battle on

MUMBAI: RBI deputy governor T Rabi Sankar said the fight against digital fraud is far from over, noting that the decline seen earlier this year reversed in July, with cases rising again.He said fraud levels had been falling since the start of the year before...

iOS 26.1 update boosts iPhone security and performance improvements

NEWYou can now listen to Fox News articles! Apple's iOS 26.1 update is more than a standard patch. It boosts security, speeds up performance and adds practical upgrades to features you already use. The update fixes dozens of vulnerabilities that impact Safari, Photos and Apple...