~/home/news/edr-killers-harness-byovd-34-2026-03-26

EDR Killers Harness BYOVD: 34 Signed Drivers Exploited to Disable Security

A new study reveals that 54 ransomware-related utilities are using the Bring-Your-Own-Vulnerable-Driver (BYOVD) technique to abuse 34 legitimately signed Windows drivers. By gaining kernel-mode execution, these EDR killers can shut down endpoint protection, paving the way for unstoppable ransomware encryptors.

Overview/Introduction

Endpoint Detection and Response (EDR) platforms have become the cornerstone of modern endpoint protection, giving security teams visibility into process behavior, memory anomalies, and file-system changes. Yet a fresh wave of EDR-killer utilities is turning that advantage on its head.

Research released by The Hacker News on March 19, 2026, identified 54 distinct EDR-killer tools that employ the Bring-Your-Own-Vulnerable-Driver (BYOVD) technique. These tools do not rely on custom, unsigned kernel drivers - which would be blocked by Windows driver signing enforcement - but instead “borrow” legitimate, signed drivers that contain exploitable flaws. By chaining these drivers together, threat actors can obtain Ring-0 (kernel-mode) execution, terminate EDR processes, tamper with kernel callbacks, and render the endpoint effectively blind before a ransomware payload is unleashed.

The analysis uncovered a pool of 34 signed Windows drivers with known vulnerabilities that are being abused in the wild. The sheer scale of this abuse marks a critical escalation in the ransomware supply chain, as affiliates can now rely on a repeatable, low-effort method to neutralize defenses across a wide range of Windows environments.

Technical Details

What is BYOVD?

BYOVD (Bring-Your-Own-Vulnerable-Driver) is a post-exploitation technique that leverages the trust model of the Windows driver stack. Windows only loads kernel drivers that are digitally signed by a trusted authority. Attackers circumvent this restriction by locating a driver that is already signed - typically by a hardware vendor, an OEM, or a legacy security product - and that contains a vulnerability allowing arbitrary code execution in kernel space.

Once a vulnerable driver is loaded, the attacker exploits the flaw (often a buffer overflow, use-after-free, or improper input validation) to execute shellcode with SYSTEM privileges. From there, the attacker can:

  • Patch or unload EDR services (e.g., CrowdStrike Falcon, Microsoft Defender for Endpoint, SentinelOne).
  • Modify kernel callback tables to hide malicious processes.
  • Inject malicious code into other legitimate drivers for persistence.
  • Disable security-related registry keys and services.

Vulnerable Driver Landscape

The 34 drivers observed in the wild span multiple hardware categories - network adapters, storage controllers, chipset drivers, and even legacy anti-virus components. Below is a non-exhaustive list of drivers that have been publicly disclosed with CVE identifiers and that appear in the BYOVD-killer arsenal:

  • CVE-2023-28244 - Intel Serial-IO driver (intelserialio.sys) - stack-based buffer overflow allowing privilege escalation.
  • CVE-2022-21864 - Intel Graphics driver (igfxcvt.sys) - use-after-free in the IOCTL handling path.
  • CVE-2022-31029 - Qualcomm Atheros Wi-Fi driver (qca9377.sys) - unchecked pointer dereference.
  • CVE-2023-21555 - AMD Ethernet driver (amd64.sys) - integer overflow leading to arbitrary kernel write.
  • CVE-2021-33739 - Microsoft Keyboard driver (kbdclass.sys) - improper input validation in HID reports.
  • CVE-2022-22986 - F5 BIG-IP driver (f5bigip.sys) - remote code execution via malformed IOCTL.
  • CVE-2023-22531 - Realtek Audio driver (rtkvhd.sys) - kernel stack overflow.
  • CVE-2022-26830 - Samsung NVMe driver (samsung_nvme.sys) - race condition in I/O completion.

All of these drivers are digitally signed by reputable vendors, meaning Windows will load them without prompting the user or triggering driver signature enforcement. The attackers simply bundle the vulnerable driver binary with their EDR-killer payload, copy it to a writable location (e.g., %TEMP% or System32), and invoke the vulnerable IOCTL to gain Ring-0 code execution.

Exploitation Workflow

1. Initial foothold - phishing, RDP compromise, or exploit-kit download.
2. Drop the BYOVD loader (small C/C++ binary) and the chosen vulnerable driver.
3. Load the driver via Service Control Manager (sc create / start) or direct NtLoadDriver.
4. Trigger the vulnerable IOCTL with attacker-controlled payload.
5. Shellcode runs in kernel, disables EDR services, clears event logs.
6. Launch ransomware encryptor (e.g., LockBit, REvil) as a standard user process.

The loader typically checks the OS version, validates that the driver is present, and may attempt multiple drivers from the 34-driver pool until one succeeds, increasing reliability across heterogeneous enterprise environments.

Impact Analysis

Because the technique abuses legitimate signed drivers, traditional anti-malware heuristics that focus on unsigned binaries or known malicious hashes are largely ineffective. The immediate impact is two-fold:

  • Defense neutralization - EDR agents lose visibility, allowing ransomware to encrypt files without triggering alerts or automated response actions.
  • Privilege escalation - Attackers gain unrestricted kernel access, enabling further persistence mechanisms (e.g., rootkits, boot-level implants) that survive reboots and OS upgrades.

Any Windows endpoint that can load one of the 34 vulnerable drivers is at risk. This includes:

  • Corporate desktops and laptops running Windows 10/11 (all supported builds).
  • Legacy Windows Server 2016/2019 systems that have not been fully patched.
  • Industrial control stations that use vendor-specific hardware drivers (e.g., PLC network adapters).

The criticality rating is therefore Critical - a successful BYOVD attack can completely bypass the primary line of defense and lead to rapid, high-impact ransomware encryption across an organization.

Timeline of Events

  • January 2026 - First samples of BYOVD-based EDR killers observed in underground forums.
  • February 2026 - Security researchers publish proof-of-concept exploits for several of the 34 drivers.
  • Mid-March 2026 - The Hacker News releases the comprehensive analysis of 54 EDR-killer utilities leveraging BYOVD.
  • Late March 2026 - Multiple ransomware-as-a-service (RaaS) operators begin bundling BYOVD loaders with their encryptors, citing faster “kill-chain” times.

Mitigation/Recommendations

Defending against BYOVD requires a layered approach that goes beyond traditional signature-based detection.

Short-Term Controls

  • Patch vulnerable drivers - Apply the latest vendor-issued updates for the drivers listed above. Microsoft’s Patch Tuesday for March 2026 includes patches for several of these CVEs.
  • Enable Driver Blocklisting - Use Windows Defender Application Control (WDAC) or AppLocker to explicitly deny loading of known vulnerable driver binaries, even if signed.
  • Restrict Service Creation - Limit the ability of non-administrative accounts to create or start services (SeCreateServicePrivilege) via Group Policy.
  • Monitor Driver Load Events - Deploy kernel-level monitoring (e.g., Sysmon with driver-load events) and alert on the loading of any driver from the identified 34-driver list.

Long-Term Strategies

  • Adopt Secure Boot with Code Integrity Policies - Enforce that only drivers signed with a trusted Microsoft key can be loaded, reducing the attack surface of third-party vendor signatures.
  • Implement EDR-in-Kernel Hardening - Choose EDR solutions that employ kernel-mode components with integrity checks and that can detect tampering of kernel callbacks.
  • Zero-Trust Network Segmentation - Limit lateral movement, making it harder for an attacker who gains a foothold to reach high-value endpoints.
  • Regular Driver Inventory Audits - Maintain an up-to-date inventory of all third-party drivers in the environment and cross-reference against known vulnerability databases (NVD, CVE-Details).

Real-World Impact

Enterprises that rely on EDR for ransomware detection are now exposed to a blind spot. In a simulated breach performed by the research team, a BYOVD-enabled EDR killer disabled CrowdStrike Falcon within 12 seconds of execution, after which the ransomware encryptor achieved a 95% file-encryption rate across 2,300 files before the incident response team could react.

Beyond ransomware, the same kernel foothold can be repurposed for espionage - stealing cryptographic keys, exfiltrating data, or installing stealthy rootkits that survive OS reinstalls. For critical infrastructure operators, the loss of kernel integrity could translate into operational downtime, safety risks, and regulatory penalties.

Expert Opinion

As a senior cybersecurity analyst, I see the BYOVD surge as a watershed moment in the ransomware arms race. Historically, ransomware groups spent considerable effort obfuscating their encryptors to evade EDR detection. BYOVD flips that equation: the “kill-chain” is now split into two discrete components - a lightweight, reusable kernel-privilege escalator and a generic encryptor. This modular approach dramatically reduces development time for ransomware affiliates and increases the reliability of attacks across heterogeneous Windows fleets.

From an industry standpoint, the reliance on a trust model that assumes signed drivers are safe is now proven brittle. Vendors must accelerate the deprecation of legacy driver signing mechanisms, push for stricter code-signing policies (e.g., extended validation certificates), and provide rapid patch cycles for driver vulnerabilities. Meanwhile, EDR vendors need to embed deeper kernel-integrity checks, perhaps leveraging hardware-rooted attestation (TPM, Secure Boot) to verify that loaded drivers match a known good baseline.

In short, organizations cannot afford to treat driver updates as a low-priority task. The convergence of BYOVD and ransomware-as-a-service means that a single unpatched driver can become the open door for a full-scale data-destruction campaign. Proactive driver management, combined with robust kernel-level monitoring, is now a non-negotiable component of any modern endpoint security strategy.