{"id":324,"date":"2026-03-19T19:17:02","date_gmt":"2026-03-19T19:17:02","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=324"},"modified":"2026-03-19T19:17:02","modified_gmt":"2026-03-19T19:17:02","slug":"54-edr-killers-use-byovd-to-exploit-34-signed-vulnerable-drivers-and-disable-security","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=324","title":{"rendered":"54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiIi1shGpEknr4-CSa7F-hGXgqRLy4TeRhG2CLzUE9WOs7c-XA-TRmAFhxGmJePCWAjYzRvtRW5ukvGvKluq5hOfv8F8QmzqTUxVjElk6zf3ovVxZIvqUdn1A2Z02kv7t8efDgyyZEUljfWZRxOZqAynFB92c66-ywA8vxkCUXiJ75g4U2vJUlOlzblxU_z\/s1700-e365\/edr.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a total of 34 vulnerable drivers.<\/p>\n<p>EDR killer programs have been a common presence in ransomware intrusions as they offer a way for affiliates to neutralize security software before deploying file-encrypting malware. This is done so in an attempt to evade detection.<\/p>\n<p>\u00abRansomware gangs, especially those with ransomware-as-a-service (RaaS) programs, frequently produce new builds of their encryptors, and ensuring that each new build is reliably undetected can be time-consuming,\u00bb ESET researcher Jakub Sou\u010dek <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/edr-killers-explained-beyond-the-drivers\/#The%20technology%20behind%20EDR%20killers\" rel=\"noopener\" target=\"_blank\">said<\/a> in a report shared with The Hacker News.<\/p>\n<p>\u00abMore importantly, encryptors are inherently very noisy (as they inherently need to modify a large number of files in a short period); making such malware undetected is rather challenging.\u00bb<\/p>\n<p>EDR killers act as a specialized, external component that&#8217;s run to disable security controls before executing the lockers themselves, thereby keeping the latter simple, stable, and easy to rebuild. That&#8217;s not to say there have not been instances where EDR termination and ransomware modules have been fused into one single binary. Reynolds ransomware is a case in point.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/not-fast-enough-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhlXM830ruQd2xT6M7JNeNRjaFa1onD12WjSCHihTFMTzbyfT9h-irPmXy_h3E1HGSs6sdv7FTmnyNVTM5kmSb7BuUtZe8gKoTQt99P1sSzRcqqXpOJP6eoAOhR3DGb6qHx9kOZ_HBZUMmVnsnd0DM7QfUp81bgzTvvgLww6oqB-EhnDfWXH5pWCYhAsyLs\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>A majority of the EDR killers rely on legitimate yet vulnerable drivers to gain elevated privileges and achieve their goals. Among the nearly 90 EDR killer tools detected by the Slovakian cybersecurity company, more than half of them utilize the well-known BYOVD tactic simply because it&#8217;s reliable.<\/p>\n<p><a name=\"more\"\/><\/p>\n<p>\u00abThe goal of a <a href=\"https:\/\/www.picussecurity.com\/resource\/blog\/what-are-bring-your-own-vulnerable-driver-byovd-attacks\" rel=\"noopener\" target=\"_blank\">BYOVD attack<\/a> is to gain kernel-mode privileges, often called Ring 0,\u00bb Bitdefender <a href=\"https:\/\/techzone.bitdefender.com\/en\/tech-explainers\/what-is-bring-your-own-vulnerable-driver--byovd-.html\" rel=\"noopener\" target=\"_blank\">explains<\/a>. \u00abAt this level, code has unrestricted access to system memory and hardware. Since an attacker cannot load an unsigned malicious driver, they &#8216;bring&#8217; a driver signed by a reputable vendor (such as a hardware manufacturer or an old antivirus version) that has a known vulnerability.\u00bb<\/p>\n<p>Armed with the kernel access, threat actors can terminate EDR processes, disable security tools, tamper with kernel callbacks, and undermine endpoint protections. The result is an abuse of Microsoft&#8217;s driver trust model to evade defenses, taking advantage of the fact that the vulnerable driver is legitimate and signed.<\/p>\n<p>The BYOVD-based EDR killers are primarily developed by three types of threat actors &#8211;<\/p>\n<ul>\n<li>Closed ransomware groups like DeadLock and Warlock that do not rely on affiliates<\/li>\n<li>Attackers forking and tweaking existing proof-of-concept code (e.g., SmilingKiller and TfSysMon-Killer)<\/li>\n<li>Cybercriminals marketing such tools on underground marketplaces as a service (e.g., DemoKiller aka <a href=\"https:\/\/www.linkedin.com\/pulse\/emerging-threat-%D0%B1%D0%B0%D1%84%D0%BE%D0%BC%D0%B5%D1%82-edr-killer-tammy-harper-ombuc\/\" rel=\"noopener\" target=\"_blank\">\u0411\u0430\u0444\u043e\u043c\u0435\u0442<\/a>, ABYSSWORKER, and CardSpaceKiller)\u00a0<\/li>\n<\/ul>\n<p>ESET said it also identified script-based tools that make use of built-in administrative commands like taskkill, net stop, or sc delete to interfere with the regular functioning of security product processes and services. Select variants have also been found to combine scripting with Windows Safe Mode.<\/p>\n<p>\u00abSince Safe Mode loads only a minimal subset of the operating system, and security solutions typically aren\u2019t included, malware has a higher chance of disabling protection,\u00bb the company noted. \u00abAt the same time, such activity is very noisy, as it requires a reboot, which is risky and unreliable in unknown environments. Therefore, it is seen only rarely in the wild.\u00bb<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/cyber-comm-guide-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEigDbfWwE4P_DsjfBRxgecgosqTRr8-2j328LrzdUBWrWmWeDUTI7OhXc-zXveYOjBc7GStGz5WnpXsJGaLCuoryIXbL7NxRyaWzIJGO1TBpd48NkYzNqTMj9zWMzgfvqh20RxsdMll45TFiMzXja0pAd7roFjMnzsRYBGHOWSLnyKN-oMKyCLoYcjmb5hm\/s728-e100\/ciso-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The third category of EDR killers are anti-rootkits, which include legitimate utilities such as GMER, HRSword, and PC Hunter, that offer an intuitive user interface to terminate protected processes or services. A fourth, emerging class is a set of driverless EDR killers like EDRSilencer and EDR-Freeze that block outbound traffic from EDR solutions and cause the programs to enter a \u00abcoma\u00bb like state.<\/p>\n<p>\u00abAttackers aren\u2019t putting much effort into making their encryptors undetected,\u00bb ESET said. \u00abRather, all the sophisticated defense-evasion techniques have shifted to the user-mode components of EDR killers. This trend is most visible in commercial EDR killers, which often incorporate mature anti-analysis and anti-detection capabilities.\u00bb<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgBMx0so9ATxRo2u8r1K8RvC2uu7WE_9KILWEc8dFt-kd-KpwLf-F5slWRt0GHKqMXpjecnDMtOCiZW5QfXQ1jzCbMKd4bIZV0sjzJE883YSNUrXv-Cv82U7FZWPtpqyEZL2o7Av5thYHvoM1VghnWqGPsONvkQB2nKdaIX6L2h3ywVvEUETM6iP1KtD0Uw\/s1700-e365\/GMEr.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgBMx0so9ATxRo2u8r1K8RvC2uu7WE_9KILWEc8dFt-kd-KpwLf-F5slWRt0GHKqMXpjecnDMtOCiZW5QfXQ1jzCbMKd4bIZV0sjzJE883YSNUrXv-Cv82U7FZWPtpqyEZL2o7Av5thYHvoM1VghnWqGPsONvkQB2nKdaIX6L2h3ywVvEUETM6iP1KtD0Uw\/s1700-e365\/GMEr.jpg\" alt=\"\" border=\"0\" data-original-height=\"680\" data-original-width=\"906\"\/><\/a><\/div>\n<p>To combat ransomware and EDR killers, blocking commonly misused drivers from loading is a necessary defense mechanism. However, given that EDR killers are executed only at the last stage and just before launching the encryptor, a failure at this stage means the threat actor can easily switch to another tool to accomplish the same task.<\/p>\n<p>The implication is that organizations need layered defenses and detection strategies in place to proactively monitor, flag, contain, and remediate the threat at each every stage of the attack lifecycle.<\/p>\n<p>\u00abEDR killers endure because they&#8217;re cheap, consistent, and decoupled from the encryptor \u2013 a perfect fit for both encryptor developers, who don\u2019t need to focus on making their encryptors undetectable, and affiliates, who possess an easy-to-use, powerful utility to disrupt defenses prior to encryption,\u00bb ESET said.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A new analysis of endpoint detection and response (EDR) killers has revealed that 54 of them leverage a technique known as bring your own vulnerable driver (BYOVD) by abusing a&hellip;<\/p>\n","protected":false},"author":1,"featured_media":325,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[119,772,771,632,120,768,47,769,770],"class_list":["post-324","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-byovd","tag-disable","tag-drivers","tag-edr","tag-exploit","tag-killers","tag-security","tag-signed","tag-vulnerable"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/324","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=324"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/324\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/325"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=324"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=324"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}