ATLA WIRE

54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security

20.03.2026
9873
54 EDR Killers Use BYOVD to Exploit 34 Signed Vulnerable Drivers and Disable Security
A new wave of 54 EDR-killing malware tools is exploiting 34 signed but vulnerable drivers via BYOVD attacks, gaining kernel-level access to disable security defenses and boost ransomware success rates.

EDR Killers Are Exploiting Signed Drivers — And It's Getting Ugly

Hold up, security pros — we've got a major red alert. Researchers just uncovered 54 different EDR-killing malware tools that are weaponizing 34 signed but vulnerable drivers. They're using BYOVD (Bring Your Own Vulnerable Driver) attacks to bypass security and gain kernel-level access. Translation: they're turning legit-signed drivers into weapons to disable your defenses.
This isn't just theoretical — these attacks are actively being used in ransomware campaigns to disable endpoint detection and response (EDR) solutions. Once they get kernel access, they can literally shut down security tools before deploying ransomware payloads. Success rates? Skyrocketing.
  • 54 distinct EDR-killer tools identified
  • Exploiting 34 different signed vulnerable drivers
  • Using BYOVD (Bring Your Own Vulnerable Driver) technique
  • Gaining kernel-level access to disable security
  • Directly boosting ransomware success rates
The scary part? These drivers are signed — meaning they pass basic authenticity checks. Attackers are finding vulnerable drivers that haven't been properly secured, then using them as their entry point. Once they're in at the kernel level, they can manipulate system processes, disable security monitoring, and prepare the system for ransomware deployment.
Article image 1
This represents a significant evolution in attacker tradecraft. Instead of trying to bypass EDR through user-space tricks, they're going straight for the kernel — the most privileged part of the operating system. Once there, they can disable security tools completely, making subsequent attacks much harder to detect and stop.
Security teams need to be on high alert for driver-based attacks. This means monitoring driver installations, checking for known vulnerable drivers, and implementing driver blocklisting where possible. The fact that 34 different drivers are being exploited suggests this isn't a narrow problem — it's a systemic issue with driver security.
Bottom line: Your EDR might be signed, sealed, and delivered — but if attackers can exploit vulnerable signed drivers to get kernel access, they can turn it off like a light switch. Time to check your driver security posture, because the attackers definitely are.
#EDR инструменты#атака BYOVD#вредоносное ПО#вымогательское ПО#уязвимые драйверы
Есть тема? Пишите ATLA WIRE в Telegram:t.me/atla_community
Banner | ATLA WIRE
ATLA WIRE