A sophisticated and dangerous escalation in ransomware tactics has been identified by cybersecurity researchers. The threat actors behind the Qilin and Warlock ransomware families are now systematically exploiting legitimate but vulnerable kernel-mode drivers to disable endpoint detection and response (EDR) and antivirus (AV) software on targeted systems. This technique, known as Bring Your Own Vulnerable Driver (BYOVD), allows the malware to gain the highest level of privileges in the Windows operating system. Once at the kernel level, the ransomware can directly tamper with security tools, effectively blinding them before deploying its file-encrypting payload. This represents a direct assault on the foundational security infrastructure of enterprises, moving beyond user-space manipulation to attack the core of the operating system itself.
The campaigns have been observed leveraging drivers with known security flaws, often obtained from legitimate hardware manufacturers. These signed drivers, which are trusted by the Windows operating system, are weaponized to load malicious code into the kernel. Security analysts report that the ransomware payloads incorporate functionality to disable or uninstall over 300 distinct EDR and AV products. The list is extensive, targeting solutions from major vendors like CrowdStrike, Microsoft Defender, SentinelOne, and Sophos, among many others. By neutralizing these defenses, the attackers ensure their encryption process proceeds unimpeded, dramatically increasing the likelihood of a successful ransomware deployment and subsequent extortion.
This shift to BYOVD attacks signifies a maturation of the ransomware ecosystem, where adversaries are investing significant resources to overcome advanced defensive technologies. It underscores a critical weakness in the traditional security model: the inherent trust placed in signed kernel drivers. While Microsoft has implemented measures like Driver Blocklisting through Windows Defender Application Control and Hypervisor-Protected Code Integrity (HVCI), many organizations have not fully deployed these mitigations. The success of Qilin and Warlock demonstrates that without these hardening measures, even advanced EDR tools can be rendered useless by a sufficiently privileged attack.
To defend against this growing threat, organizations must adopt a layered security strategy that extends beyond conventional endpoint protection. Critical recommendations include enforcing strict policies on driver installation, utilizing Microsoft's vulnerable driver blocklist, and enabling security features like HVCI in Windows 11 and Windows 10. Furthermore, deploying dedicated threat-hunting tools that can detect anomalous kernel-level activity and implementing robust application control allowlists are essential steps. This incident serves as a stark reminder that in modern cybersecurity, the integrity of the kernel is the final frontier, and its protection must be a top priority for any organization seeking to resist the evolving ransomware threat.



