CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Mass exploitation of signed vulnerable drivers by 54 EDR killer tools via BYOVD technique

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

Security vendors have identified 54 distinct EDR killer tools that abuse Bring Your Own Vulnerable Driver (BYOVD) techniques by exploiting 34 vulnerable, signed drivers to disable endpoint detection and response (EDR) solutions. The tools are deployed primarily by ransomware groups, affiliates, and underground service providers to neutralize security controls before executing file-encrypting malware. Attackers gain kernel-mode privileges (Ring 0) to terminate EDR processes, disable protection mechanisms, and tamper with kernel callbacks, thereby undermining endpoint defenses through abuse of Microsoft’s driver trust model.

Timeline

  1. 19.03.2026 20:52 1 articles · 3h ago

    54 EDR killer tools abuse 34 vulnerable signed drivers via BYOVD to disable security software

    Security analysis identifies 54 EDR killer tools that exploit 34 vulnerable, signed drivers using Bring Your Own Vulnerable Driver (BYOVD) techniques to gain kernel-mode access and terminate or disable EDR solutions. The tools are deployed primarily by ransomware groups, affiliates, and underground service providers to neutralize endpoint defenses prior to encryption. Attackers gain elevated privileges to tamper with kernel callbacks and undermine endpoint protections through abuse of Microsoft’s trusted driver model.

    Show sources

Information Snippets