By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Computing

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

News Room
Last updated: 2026/04/06 at 7:06 AM
News Room Published 6 April 2026
Share
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
SHARE

Ravie LakshmananApr 06, 2026Ransomware / Endpoint Security

Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro.

Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named “msimg32.dll,” which initiates a multi-stage infection chain to disable endpoint detection and response (EDR) solutions. The DLL, launched via DLL side-loading, is capable of terminating more than 300 EDR drivers from almost every security vendor in the market.

“The first stage consists of a PE loader responsible for preparing the execution environment for the EDR killer component,” Talos researchers Takahiro Takeda and Holger Unterbrink said. “This secondary payload is embedded within the loader in an encrypted form.”

The DLL loader implements an array of techniques to evade detection. It neutralizes user-mode hooks, suppresses Event Tracing for Windows (ETW) event logs, and takes steps to conceal control flow and API invocation patterns. As a result, it allows the main EDR killer payload to be decrypted, loaded, and executed entirely in memory while entirely flying under the radar.

Once launched, the malware makes use of two drivers –

  • rwdrv.sys, a renamed version of “ThrottleStop.sys” that’s used to gain access to the system’s physical memory and act as a kernel-mode hardware access layer.
  • hlpdrv.sys, to terminate processes associated with over 300 different EDR drivers belonging to various security solutions.

It’s worth noting that both drivers have been used as part of BYOVD attacks carried out in conjunction with Akira and Makop ransomware intrusions.

“Prior to loading the second driver, the EDR killer component unregisters monitoring callbacks established by the EDR, ensuring that process termination can proceed without interference,” Talos said. “It demonstrates the sophisticated tricks the malware is employing to circumvent or completely disable modern EDR protection features on compromised systems.”

According to statistics compiled by CYFIRMA and Cynet, Qilin has emerged as the most active ransomware group in recent months, claiming hundreds of victims. The group has been linked to 22 out of 134 ransomware incidents that were reported in Japan in 2025, representing 16.4% of all attacks.

“Qilin primarily relies on stolen credentials to gain initial access,” Talos said. “After successfully breaching a target environment, the group places considerable emphasis on post-compromise activities, allowing it to methodically expand its control and maximize impact.”

The cybersecurity vendor also noted that ransomware execution occurred on average roughly six days after the initial compromise, highlighting the need for organizations to detect malicious activity at the earliest possible stage and to prevent the deployment of ransomware.

The disclosure comes as the Warlock (aka Water Manaul) ransomware group continues to exploit unpatched Microsoft SharePoint servers, while updating its toolset for enhanced persistence, lateral movement, and defense evasion.This includes the use of TightVNC for persistent control and a legitimate-but-vulnerable NSec driver (“NSecKrnl.sys”) in a BYOVD attack to terminate security products at the kernel level, replacing the “googleApiUtil64.sys” driver used in prior campaigns.

Also observed during the course of the Warlock attack in January 2026 were the following tools –

  • PsExec, for lateral movement.
  • RDP Patcher, for facilitating concurrent RDP sessions.
  • Velociraptor, for command-and-control (C2).
  • Visual Studio Code and Cloudflare Tunnel, for tunneling C2 communications.
  • Yuze, for intranet penetration and establishing a reverse proxy connection to the attacker’s C2 server across HTTP (port 80), HTTPS (port 443), and DNS (port 53).
  • Rclone, for data exfiltration.

To counter BYOVD threats, it’s recommendedto only allow signed drivers from explicitly trusted publishers, monitor driver installation events, and maintain a rigorous patch management schedule for updating security software, specifically those with driver-based components that could be exploited. 

“Warlock’s reliance on vulnerable drivers to disable security controls requires a multilayered defense focused on kernel integrity,” Trend Micro said. “Thus, organizations must upgrade from basic endpoint protection to enforcing strict driver governance and real-time monitoring of kernel-level activities.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 5 Android Smartphones More Powerful Than Nintendo Switch – BGR 5 Android Smartphones More Powerful Than Nintendo Switch – BGR
Next Article This iPhone Feature Will Scold You if Your Camera Lens Is Dirty This iPhone Feature Will Scold You if Your Camera Lens Is Dirty
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
Computing
Get 200GB Of Secure Proton Drive Storage for  a Month
Get 200GB Of Secure Proton Drive Storage for $1 a Month
News
Gaming on a budget? These Alienware deals just stopped me in my tracks
Gaming on a budget? These Alienware deals just stopped me in my tracks
News
Data visualization all-stars unveil Ridge AI with .6M to fix the analytics problem for SaaS apps
Data visualization all-stars unveil Ridge AI with $2.6M to fix the analytics problem for SaaS apps
Computing

You Might also Like

How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers
Computing

How LiteLLM Turned Developer Machines Into Credential Vaults for Attackers

8 Min Read
Data visualization all-stars unveil Ridge AI with .6M to fix the analytics problem for SaaS apps
Computing

Data visualization all-stars unveil Ridge AI with $2.6M to fix the analytics problem for SaaS apps

7 Min Read
Google Proposes JSIR As A High-Level IR For JavaScript
Computing

Google Proposes JSIR As A High-Level IR For JavaScript

1 Min Read
NetEase to launch mobile version of new martial arts game Where Winds Meet next week · TechNode
Computing

NetEase to launch mobile version of new martial arts game Where Winds Meet next week · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?