Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security

In the end Meta decided not to shut down Horizon Worlds on VR

FBI seizes website of pro-Iranian hacker group following devastating hack by Stryker

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » 54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security
Identity

54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security

By March 19, 2026No Comments4 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

A new analysis of endpoint detection and response (EDR) killers reveals that 54 of them leverage a technique known as bring-your-own-vulnerable-driver (BYOVD), for a total of 34 vulnerable drivers.

EDR killer programs are common in ransomware intrusions because they provide a way for affiliates to neutralize security software before deploying file-encrypting malware. This is done to avoid detection.

“Ransomware gangs, especially those using ransomware-as-a-service (RaaS) programs, frequently create new builds of their encryption programs, and ensuring new builds go undetected can be time-consuming,” ESET researcher Jakub Souček said in a report shared with The Hacker News.

“More importantly, encryption programs are inherently very noisy (because they inherently have to modify a large number of files in a short period of time), making it quite difficult for such malware to go undetected.”

The EDR killer acts as a specialized external component that runs to disable security controls before running the locker itself. This makes the locker itself simple, stable, and easy to rebuild. There have been instances where EDR termination modules and ransomware modules have been fused into a single binary. Reynolds ransomware is a great example.

The majority of EDR killers rely on legitimate but vulnerable drivers to gain elevated privileges and accomplish their goals. Of the nearly 90 EDR killer tools detected by Slovak cybersecurity firms, more than half utilize the well-known BYOVD tactic simply because it’s trusted.

“The goal of a BYOVD attack is to gain privileges in kernel mode, often referred to as ring 0,” Bitdefender explains. “At this level, code has unrestricted access to system memory and hardware. Attackers cannot load unsigned malicious drivers, so they can ‘bring in’ drivers signed by trusted vendors (such as hardware manufacturers or outdated antivirus versions) with known vulnerabilities.

Armed with access to the kernel, threat actors can terminate EDR processes, disable security tools, tamper with kernel callbacks, and weaken endpoint protection. As a result, Microsoft’s driver trust model can be exploited to bypass defenses by leveraging the fact that vulnerable drivers are legitimate and signed.

BYOVD-based EDR killers are primarily developed by three types of threat actors:

Closed ransomware groups such as DeadLock and Warlock that do not rely on affiliates Attackers who fork and tweak existing proof-of-concept code (such as SmilingKiller and TfSysMon-Killer) Cybercriminals who sell such tools as a service on underground marketplaces (such as DemoKiller aka Бафомет, ABYSSWORKER, CardSpaceKiller)

ESET said it has also identified script-based tools that utilize built-in administrative commands such as taskkill, net stop, and sc delete to disrupt the normal functioning of security product processes and services. Some variants have also been found to combine scripting with Windows Safe Mode.

“Safe mode loads only a minimal subset of the operating system and typically does not include security solutions, increasing the likelihood that malware will disable protection,” the company said. “At the same time, such activity is very noisy due to the need for restarts, and is dangerous and unreliable in an unknown environment. Therefore, this activity is rarely seen in practice.”

The third category of EDR killers are anti-rootkits. This includes legitimate utilities such as GMER, HRSword, and PC Hunter that provide an intuitive user interface for terminating protected processes and services. The fourth emerging class is a set of driverless EDR killers, such as EDRSilencer and EDR-Freeze, which block outbound traffic from an EDR solution and put the program into a “coma”-like state.

“The attackers are not putting much effort into making their encryption devices undetectable,” ESET said. “Rather, all sophisticated defensive evasion techniques have migrated to the user-mode components of EDR killers. This trend is most evident in commercial EDR killers, which often incorporate mature anti-analysis and anti-detection capabilities.”

Blocking exploitable drivers from loading is a necessary defense mechanism to combat ransomware and EDR killers. However, given that the EDR killer only runs during the final stage and just before launching the encryption program, if it fails at this stage, the threat actor can easily switch to another tool to accomplish the same task.

This means organizations must deploy layered defense and detection strategies to proactively monitor, flag, contain, and remediate threats at each stage of the attack lifecycle.

“EDR Killer persists because it is cheap, consistent, and decoupled from the cryptographic equipment. It is ideal for both cryptographic equipment developers who do not need to focus on making their cryptographic equipment undetectable, and affiliates that have an easy-to-use and powerful utility that destroys defenses before encryption,” ESET said.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleIn the end Meta decided not to shut down Horizon Worlds on VR

Related Posts

FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

March 19, 2026

New Perseus Android banking malware monitors Notes app and extracts sensitive data

March 19, 2026

How Ceros gives security teams visibility and control over their code

March 19, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

54 EDR killers use BYOVD to exploit 34 signed vulnerability drivers to disable security

In the end Meta decided not to shut down Horizon Worlds on VR

FBI seizes website of pro-Iranian hacker group following devastating hack by Stryker

FortiGate RaaS, Citrix Exploits, MCP Abuse, LiveChat Phish & More

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.