EDR Killer Tool Abuses Revoked EnCase Kernel Driver
Summary
Hide ▲
Show ▼
A custom EDR killer tool has been observed using a revoked but still valid EnCase kernel driver to disable 59 security tools. The attack involved breaching a network via compromised SonicWall SSL VPN credentials and exploiting the lack of multi-factor authentication (MFA). The tool terminates security processes using the driver's kernel-mode IOCTL interface, bypassing Windows protections like Protected Process Light (PPL). The intrusion is suspected to be related to ransomware activity, though the final payload was not deployed.
Timeline
-
04.02.2026 16:17 1 articles · 8h ago
EDR Killer Tool Uses Revoked EnCase Kernel Driver
A custom EDR killer tool has been observed using a revoked but still valid EnCase kernel driver to disable 59 security tools. The attack involved breaching a network via compromised SonicWall SSL VPN credentials and exploiting the lack of multi-factor authentication (MFA). The tool terminates security processes using the driver's kernel-mode IOCTL interface, bypassing Windows protections like Protected Process Light (PPL). The intrusion is suspected to be related to ransomware activity, though the final payload was not deployed.
Show sources
- EDR killer tool uses signed kernel driver from forensic software — www.bleepingcomputer.com — 04.02.2026 16:17
Information Snippets
-
The EDR killer tool uses the 'EnPortv.sys' kernel driver, which was issued a certificate in 2006 and expired in 2010 but remains valid due to Windows' signature enforcement mechanism.
First reported: 04.02.2026 16:171 source, 1 articleShow sources
- EDR killer tool uses signed kernel driver from forensic software — www.bleepingcomputer.com — 04.02.2026 16:17
-
The attackers breached the network using compromised SonicWall SSL VPN credentials and exploited the lack of MFA.
First reported: 04.02.2026 16:171 source, 1 articleShow sources
- EDR killer tool uses signed kernel driver from forensic software — www.bleepingcomputer.com — 04.02.2026 16:17
-
The tool targets 59 processes related to EDR and antivirus tools, executing a kill loop every second to terminate any restarted processes.
First reported: 04.02.2026 16:171 source, 1 articleShow sources
- EDR killer tool uses signed kernel driver from forensic software — www.bleepingcomputer.com — 04.02.2026 16:17
-
The kernel driver is installed as a fake OEM hardware service, providing reboot-resistant persistence.
First reported: 04.02.2026 16:171 source, 1 articleShow sources
- EDR killer tool uses signed kernel driver from forensic software — www.bleepingcomputer.com — 04.02.2026 16:17
-
The attack involved aggressive internal reconnaissance, including ICMP ping sweeps, NetBIOS name probes, and SMB-related activity, with SYN flooding exceeding 370 SYNs/sec.
First reported: 04.02.2026 16:171 source, 1 articleShow sources
- EDR killer tool uses signed kernel driver from forensic software — www.bleepingcomputer.com — 04.02.2026 16:17