Ethical Hacking News
A recent analysis by ESET has revealed that 54 EDR killer tools have leveraged a technique known as bring your own vulnerable driver (BYOVD) to exploit vulnerabilities in 35 signed drivers. This tactic enables these malicious programs to disable security measures and evade detection, highlighting the need for layered defenses and detection strategies to proactively monitor and remediate threats at every stage of the attack lifecycle.
54 EDR killer tools have used BYOVD to exploit vulnerabilities in 35 signed drivers. The primary objective of these EDR killers is to terminate security processes and services that would otherwise detect or prevent ransomware attacks. The proliferation of BYOVD-based EDR killers underscores the sophistication and adaptability of modern threat actors. Organizations can enhance their defenses against ransomware attacks by blocking commonly misused drivers from loading and implementing robust detection strategies.
The threat landscape for cybersecurity has witnessed a significant evolution over the past few years, with endpoint detection and response (EDR) killers emerging as a formidable force in the fight against ransomware attacks. According to a recent analysis by ESET, a Slovakian cybersecurity company, 54 EDR killer tools have leveraged a technique known as bring your own vulnerable driver (BYOVD) to exploit vulnerabilities in 35 signed drivers. This tactic enables these malicious programs to disable security measures and evade detection.
The use of BYOVD is particularly noteworthy because it represents an evolution in the tactics employed by threat actors to subvert traditional security controls. Typically, EDR killers rely on legitimate yet vulnerable drivers to gain elevated privileges and achieve their goals. In this case, the 54 EDR killer tools in question exploited vulnerabilities in a total of 35 signed drivers, including drivers from well-known vendors such as Microsoft.
The primary objective of these EDR killers is to terminate security processes and services that would otherwise detect or prevent ransomware attacks. By exploiting vulnerabilities in drivers that are trusted by the system, threat actors can bypass traditional security controls and establish a foothold on the compromised endpoint. This allows them to conduct further malicious activities without being detected.
The BYOVD-based EDR killers have been found to primarily originate from three types of threat actors: closed ransomware groups, attackers who fork and tweak existing proof-of-concept code, and cybercriminals marketing such tools as a service on underground marketplaces. This proliferation of BYOVD-based EDR killers underscores the sophistication and adaptability of modern threat actors.
The implications of this development are far-reaching and underscore the need for layered defenses and detection strategies to proactively monitor, flag, contain, and remediate threats at every stage of the attack lifecycle. Given that EDR killers are executed only at the last stage before launching the encryptor, a failure at this stage can be quickly rectified by switching to another tool.
ESET noted that attackers are not investing significant resources into making their encryptors undetectable; instead, they focus on developing sophisticated defense-evasion techniques for user-mode components of EDR killers. This trend is particularly evident in commercial EDR killers, which often incorporate mature anti-analysis and anti-detection capabilities.
The rise of BYOVD-based EDR killers highlights the need for ongoing vigilance and proactive measures to safeguard against emerging threats. By blocking commonly misused drivers from loading and implementing robust detection strategies, organizations can enhance their defenses against ransomware attacks and protect themselves against sophisticated threat actors.
In conclusion, the emergence of BYOVD-based EDR killers represents a significant escalation in the sophistication and adaptability of modern threat actors. As the threat landscape continues to evolve, it is essential for cybersecurity professionals to stay informed about emerging threats and adopt proactive measures to safeguard their organizations against these dangers.
Related Information:
https://www.ethicalhackingnews.com/articles/The-Rise-of-EDR-Killers-A-Sophisticated-Threat-Landscape-Exploits-Vulnerabilities-in-35-Signed-Drivers-to-Disable-Security-Measures-ehn.shtml
Published: Fri Mar 20 01:19:53 2026 by llama3.2 3B Q4_K_M