• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
ransomware hackers using aukill tool to disable edr software using

Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD Attack

You are here: Home / General Cyber Security News / Ransomware Hackers Using AuKill Tool to Disable EDR Software Using BYOVD Attack
April 24, 2023

Risk actors are utilizing a previously undocumented “defense evasion tool” dubbed AuKill that’s built to disable endpoint detection and response (EDR) software program by means of a Convey Your Very own Susceptible Driver (BYOVD) attack.

“The AuKill resource abuses an outdated variation of the driver used by version 16.32 of the Microsoft utility, Approach Explorer, to disable EDR procedures just before deploying possibly a backdoor or ransomware on the concentrate on process,” Sophos researcher Andreas Klopsch claimed in a report revealed previous 7 days.

Incidents analyzed by the cybersecurity agency demonstrate the use of AuKill considering the fact that the commence of 2023 to deploy several ransomware strains these kinds of as Medusa Locker and LockBit. Six various variations of the malware have been discovered to date. The oldest AuKill sample features a November 2022 compilation timestamp.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The BYOVD approach relies on risk actors misusing a genuine, but out-of-day and exploitable, driver signed by Microsoft (or employing a stolen or leaked certificate) to get elevated privileges and transform off security mechanisms.

By working with respectable, exploitable drivers, the notion is to bypass a critical Windows safeguard recognized as Driver Signature Enforcement that makes certain kernel-mode drivers have been signed by a legitimate code signing authority prior to they are permitted to run.

“The AuKill software necessitates administrative privileges to work, but it cannot give the attacker people privileges,” Sophos scientists pointed out. “The risk actors utilizing AuKill took gain of existing privileges in the course of the attacks, when they acquired them by other signifies.”

This is not the initial time the Microsoft-signed Procedure Explorer driver has been weaponized in attacks. In November 2022, Sophos also thorough LockBit affiliates’ use of an open up source tool named Backstab that abused out-of-date variations of the driver to terminate shielded anti-malware processes.

Then previously this 12 months, a malvertising campaign was noticed utilizing the exact driver to distribute a .NET loader named MalVirt to deploy the FormBook info-thieving malware.

The development comes as the AhnLab Security Emergency response Centre (ASEC) exposed that improperly managed MS-SQL servers are remaining weaponized to set up the Trigona ransomware, which shares overlaps with another strain referred to as CryLock.

It also follows results that the Enjoy ransomware (aka PlayCrypt) actors have been observed employing custom data harvesting tools that make it achievable to enumerate all people and personal computers on a compromised network and copy files from the Volume Shadow Copy Assistance (VSS).

Grixba, a .NET-centered information stealer, is made to scan a machine for security plans, backup program, and remote administration equipment, and exfiltrate the collected information in the variety of CSV data files that are then compressed into ZIP archives.

Also utilized by the cybercriminal gang, tracked by Symantec as Balloonfly, is a VSS Copying Resource published in .NET that makes use of the AlphaVSS framework to record information and folders in a VSS snapshot and duplicate them to a location directory prior to encryption.

Impending WEBINARZero Have faith in + Deception: Learn How to Outsmart Attackers!

Uncover how Deception can detect innovative threats, prevent lateral motion, and enhance your Zero Trust strategy. Be a part of our insightful webinar!

Conserve My Seat!

Enjoy ransomware is noteworthy for not only making use of intermittent encryption to velocity up the process, but also for the point that it truly is not operated on a ransomware-as-a-assistance (RaaS) model. Evidence gathered so significantly details to Balloonfly carrying out the ransomware attacks as well as acquiring the malware themselves.

Grixba and VSS Copying Software are the hottest in a extensive checklist of proprietary resources this kind of as Exmatter, Exbyte, and PowerShell-dependent scripts that are utilized by ransomware actors to establish more regulate around their operations, whilst also adding further levels of complexity to persist in compromised environments and evade detection.

One more procedure significantly adopted by financially-inspired groups is the use of the Go programming language to build cross-platform malware and resist analysis reverse engineering initiatives.

Without a doubt, a report from Cyble previous week documented a new GoLang ransomware named CrossLock that employs the double-extortion method to increase the probability of payment from its victims, together with using actions to sidestep occasion tracing for Windows (ETW).

“This features can permit the malware to keep away from detection by security units that count on party logs,” Cyble stated. “CrossLock Ransomware also performs many steps to lower the odds of details recovery although concurrently growing the attack’s effectiveness.”

Observed this article fascinating? Adhere to us on Twitter  and LinkedIn to examine extra distinctive content we put up.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «study: 84% of companies use breached saas applications here's Study: 84% of Companies Use Breached SaaS Applications – Here’s How to Fix it for Free!
Next Post: Russian Hackers Tomiris Targeting Central Asia for Intelligence Gathering russian hackers tomiris targeting central asia for intelligence gathering»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.