54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security

Source: The Hacker News

Author: info@thehackernews.com (The Hacker News)

URL: https://thehackernews.com/2026/03/54-edr-killers-use-byovd-to-exploit-34.html

ONE SENTENCE SUMMARY:

EDR killers, widely used in ransomware, increasingly abuse BYOVD to gain kernel access, disable defenses, and necessitate layered detection strategies.

MAIN POINTS:

  1. Analysis found 54 EDR killers using BYOVD across 34 vulnerable drivers.
  2. Ransomware affiliates use EDR killers to neutralize security before encryption.
  3. Encryptors are noisy, making reliable stealth difficult and costly to maintain.
  4. Decoupled EDR killers keep lockers simple, stable, and frequently rebuilt.
  5. BYOVD abuses signed, vulnerable drivers to obtain Ring 0 kernel privileges.
  6. Kernel access enables killing EDR processes, disabling tools, and tampering kernel callbacks.
  7. Attackers include closed ransomware groups, PoC forkers, and marketplace “EDR-killer-as-a-service” vendors.
  8. Script-based tools use taskkill/net stop/sc delete; some leverage Windows Safe Mode.
  9. Legitimate anti-rootkits can terminate protected processes via user-friendly interfaces.
  10. Driverless killers increasingly block EDR outbound traffic, forcing “coma” states.

TAKEAWAYS:

  1. Prioritize blocking known-abused vulnerable drivers via allowlists/blocklists and policy controls.
  2. Monitor for driver loading anomalies, kernel-callback tampering, and sudden EDR process terminations.
  3. Expect tool switching near encryption time; detect earlier lifecycle stages to prevent last-minute evasion.
  4. Treat commercialized EDR killers as mature malware with strong anti-analysis and anti-detection features.
  5. Implement layered defenses combining prevention, telemetry, containment, and rapid remediation.