Ransomware Gangs Exploit Drivers to Evade EDR Defenses

Ransomware Gangs Exploit Drivers to Evade EDR Defenses

Cyber Threat Intelligence has flagged a concerning trend where both Qilin and Warlock ransomware strains are leveraging vulnerable drivers to bypass a significant number of Endpoint Detection and Response (EDR) tools. This tactic allows attackers to operate with greater stealth, potentially disabling critical security monitoring before deploying their malicious payloads.

The exploitation of these drivers is a sophisticated move, enabling the ransomware to gain kernel-level privileges. This level of access is powerful, as it allows the malware to manipulate or terminate the processes associated with over 300 different EDR solutions. By neutralizing these defenses, attackers create a much wider attack window, increasing the likelihood of successful encryption and data exfiltration.

What This Means For You

  • Security teams should proactively hunt for and remediate vulnerable or outdated drivers on endpoints, as these represent a known and exploitable attack vector for disabling EDR solutions.
๐Ÿ”Ž
Is your vendor affected? Start hunting now. Search by organization or domain, set watchlist alerts, and get notified when your third parties are compromised.
Open Intel Bot โ†’

Related coverage

Google Accidentally Exposes Chromium RCE Flaw Details

Google has inadvertently leaked critical details about an unfixed vulnerability in Chromium, as reported by BleepingComputer. This flaw allows JavaScript to persist and execute in...

threat-inteldata-breachmalware
/SCW Research /HIGH /⚙ 3 Sigma

US Citizens Plead Guilty to Aiding India-Based Tech Support Scams

Two American citizens, Adam Young (42) and Harrison Gevirtz (33), have pleaded guilty to misprision of a felony. According to The Record by Recorded Future,...

threat-inteldata-breachgovernmenttools
/SCW Research /MEDIUM

Showboat Linux Malware Targets Middle East Telecom with SOCKS5 Proxy

The Hacker News reports that a new Linux malware, named Showboat, has been actively deployed since mid-2022. This modular post-exploitation framework is designed to compromise...

threat-intelvulnerabilitymalwaretools
/SCW Vulnerability Desk /HIGH /⚑ 5 IOCs