🦠 Ransomware & Malware

Qilin and Warlock's BYOVD Assault: Silencing 300+ EDRs in the Kernel

A sneaky DLL drops. Then, two rogue drivers rip through 300+ EDRs like tissue paper. Qilin and Warlock just redefined ransomware evasion.

Digital visualization of ransomware drivers dismantling EDR shields in a kernel battlefield

⚡ Key Takeaways

  • Qilin and Warlock use BYOVD to silently disable 300+ EDR tools via vulnerable drivers like ThrottleStop.sys. 𝕏
  • Attacks feature advanced evasion: ETW suppression, callback unregistering, and living-off-the-land tools. 𝕏
  • Shift to kernel-hardened defenses like enclaves needed; traditional EDRs vulnerable. 𝕏
Published by

Threat Digest

Threat intelligence. Zero noise.

Worth sharing?

Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.

Originally reported by The Hacker News

Stay in the loop

The week's most important stories from Threat Digest, delivered once a week.