MalwareHigh

EDR Killers Exploit 35 Vulnerable Drivers to Disable Security Software

Sunday, March 22, 2026
Global
The Hacker News / ESET Research

Summary

54 EDR killers leverage 35 vulnerable drivers to gain kernel-mode privileges and terminate security tools before ransomware deployment.

Threat Analysis

A significant trend in ransomware intrusions involves the use of "EDR killer" programs designed to neutralize Endpoint Detection and Response (EDR) solutions before deploying file-encrypting malware. ESET research reveals that 54 different EDR killers exploit 35 vulnerable drivers using "bring your own vulnerable driver" (BYOVD) techniques. These tools abuse vulnerable drivers to gain kernel-mode privileges (Ring 0), providing unrestricted access to system memory and hardware. This allows attackers to terminate EDR processes, disable security tools, and tamper with kernel callbacks. EDR killers are developed by closed ransomware groups, attackers adapting existing proof-of-concept code, and cybercriminals selling such tools on underground marketplaces. Organizations must implement driver signature verification, maintain updated driver blocklists, and deploy defense-in-depth strategies to detect and prevent these sophisticated evasion techniques.

Last updated: Mar 22, 2026, 09:16 AM

Daily Intelligence

Stay Ahead of Threats

Subscribe to receive daily threat briefings delivered to your inbox. Be the first to know about emerging security risks.

No spamUnsubscribe anytimeDaily at 9 AM