Qilin and Warlock's BYOVD Assault: Silencing 300+ EDRs in the Kernel
A sneaky DLL drops. Then, two rogue drivers rip through 300+ EDRs like tissue paper. Qilin and Warlock just redefined ransomware evasion.
⚡ Key Takeaways
- Qilin and Warlock use BYOVD to silently disable 300+ EDR tools via vulnerable drivers like ThrottleStop.sys. 𝕏
- Attacks feature advanced evasion: ETW suppression, callback unregistering, and living-off-the-land tools. 𝕏
- Shift to kernel-hardened defenses like enclaves needed; traditional EDRs vulnerable. 𝕏
Worth sharing?
Get the best Cybersecurity stories of the week in your inbox — no noise, no spam.
Originally reported by The Hacker News