ThreatCluster
About Blog Help Contact
Login
  • Feed
  • Dashboard
  • Saved
THREAT HUNTING
  • Domains
  • IP Addresses
  • File Hashes
  • CVEs
THREAT INTELLIGENCE
  • APT Groups
  • Ransomware Groups
  • Malware Families
  • Attack Types
  • MITRE ATT&CK
  • Security Standards
  • Vulnerability Types
BUSINESS INTELLIGENCE
  • Companies
  • Industry Sectors
  • Security Vendors
  • Government Agencies
  • Countries
  • Platforms
Home / Feed / Article

Driver of destruction: How a legitimate driver is being used to take down AV processes

Threat Score:
48
Kaspersky Securelist
4 days ago
Part of cluster #1730
Driver of destruction: How a legitimate driver is being used to take down AV processes

Overview

Table of Contents Introduction Incident overview The AV killer analysis Calling kernel functions Process killer main routine YARA rule Victims Attribution Conclusion and recommendations Tactics, techniques and procedures Indicators of compromise Cristian Souza Ashley Muñoz Eduardo Ovalle Francesco Figurelli Anderson Leite Introduction In a recent incident response case in Brazil, we spotted intriguing new antivirus (AV) killer software that has been circulating in the wild since at least October...

Continue Reading on Original Site

Related Articles

5 articles
1

Google confirms Salesforce CRM breach, faces extortion threat

Security Affairs • 4 hours ago

Google disclosed a Salesforce Customer Relationship Management (CRM) breach exposing data of some prospective Google Ads customers. Google confirmed a breach in a Salesforce CRM instance affecting the data of prospective Google Ads customers. The website Databreaches.net reported that the attackers have sent an extortion demand to the Tech giant. Google Threat Intelligence Group confirmed that […]

Score
87
Read more
2

Google Hacked – Approx 2.5 Million Records of Google Ads Customer Data Leaked

GB Hackers • 2 hours ago

Google Hacked – Approx 2.5 Million Records of Google Ads Customer Data Leaked Google has disclosed a significant data breach involving one of its corporate Salesforce instances, compromising customer data tied to its Google Ads platform. Google has not revealed the exact number of people impacted, but according to ShinyHunters,who spoke with Cyber Security News, the breach exposed around 2.5 million records (Approx). Whether some of these entries are duplicates is still unknown. The incident, de

Score
85
Read more
3
Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Stop Reacting; Start Anticipating: The Global State of Threat Intelligence

Brighttalk • 7 hours ago

Presented by Jitin Shabadu, Forrester Analyst | Jayce Nichols, Director, Intelligence Solutions, Google Threat Intelligence Group

Score
83
Read more
4

New Win-DDoS Flaws Let Attackers Turn Public Domain Controllers into DDoS Botnet via RPC, LDAP

The Hacker News • 2 hours ago

A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create a malicious botnet and use it to conduct power distributed denial-of-service (DDoS) attacks. The approach has been codenamed Win-DDoS by SafeBreach researchers Or Yair and Shahak Morag, whopresentedtheir findings at the DEF CON 33 security conference today. "As we explored the intricacies of the Windows LDAP client code, we discovered a significant flaw that allowed us to

Score
82
Read more
5

Hackers Found Backdoor in High-Security Safes—Opens in Seconds

Spybusters • 6 hours ago

Security researchers found two techniques to crack at least eight brands of electronic safes—used to secure everything from guns to narcotics. James Rowley and Mark Omo got curious a scandal in the world of electronic safes... In the process, they'd find something far bigger: another form of backdoor intended to let authorized locksmiths open not just Liberty Safe devices, but the high-security Securam Prologic locks used in many of Liberty’s safes and those of at least seven other brands.  More

Score
76
Read more

Save to Folder

Choose a folder to save this article:

Article Intelligence

Key entities and indicators for this article

CVES
CVE-2025-7771
FILE HASHES
182ed942a52cdcf120a8919730e00ba3
182ed942a52cdcf120a8919730e00ba37619661a
1c0979ec20b87084317d1bfa50405f71
1c0979ec20b87084317d1bfa50405f7149c3b5c5
25616f83f056177c4ec24c7e99d01ca9
DOMAINS
Invoke-WMIExec.ps
Trojan-Ransom.Win
andInvoke-SMBExec.ps
FILE PATH
C:\Users\Administrator\Musicfolder on the mail server. These artifacts were later uploaded to other machines alongside the ransomware (haz8.exe), but this time to C
ATTACK TYPES
AV Evasion
BYOVD
Exploitation
Lateral Movement
Malware Deployment
COUNTRIES
Belgium
Brazil
COMPANIES
Broadcom
GitHub
GuidePoint Security
Kaspersky
SonicWall
SECURITY VENDORS
GuidePoint Security
Kaspersky
Trellix
PLATFORMS
Windows
RANSOMWARE
Akira
Defender
First
MedusaLocker
One
MALWARE
KillAV
MedusaLocker
MimiKatz
Win64.KillAV
MITRE ATT&CK
T1021
T1040
T1059.001
T1068
T1070.001
INDUSTRIES
Cybersecurity
Information Technology
VULNERABILITIES
Denial of Service
Privilege Escalation
DOMAINS
Invoke-WMIExec.ps
andInvoke-SMBExec.ps
Trojan-Ransom.Win
ARTICLE INFORMATION
Article #9142
Published 4 days ago
Kaspersky Securelist

We use cookies

We use cookies and similar technologies to enhance your experience, analyse site usage, and assist in our marketing efforts.

Cookie Settings

Essential Cookies

Required for the website to function. Cannot be disabled.

  • Session management and authentication
  • Security and fraud prevention
  • Cookie consent preferences

Analytics Cookies

Help us understand how visitors interact with our website.

  • Plausible Analytics - Privacy-focused usage statistics
  • PostHog - Product analytics and feature tracking
  • Page views and user journey analysis

Performance Cookies

Help us monitor and improve website performance.

  • Page load time monitoring
  • Error tracking and debugging
  • Performance optimisation

Marketing Cookies

Used to track visitors across websites for marketing purposes.

  • Conversion tracking
  • Remarketing campaigns
  • Social media integration