Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Reynolds Ransomware Uses Vulnerable Driver to Bypass Security

Reynolds Ransomware Uses Vulnerable Driver to Bypass Security

Posted on February 10, 2026 By CWS

Recent discoveries by cybersecurity experts have brought to light a new ransomware variant known as Reynolds. This particular strain incorporates a ‘bring your own vulnerable driver’ (BYOVD) tactic within its payload, aiming to evade detection by compromising endpoint security measures.

Understanding the BYOVD Technique

The BYOVD method involves exploiting legitimate yet flawed driver software to gain higher system privileges. By doing so, ransomware operators can disable Endpoint Detection and Response (EDR) systems, effectively concealing malicious activities. This strategy has been widely used by various ransomware groups over time.

Typically, the BYOVD approach requires a separate tool to be installed before deploying the ransomware. However, researchers from Symantec and the Carbon Black Threat Hunter Team noted that the Reynolds ransomware incorporates the vulnerable driver directly within the payload. The driver in question is the NsecSoft NSecKrnl driver, which has been previously bundled in attacks like the Ryuk ransomware incident in 2020.

Details of the Reynolds Campaign

In its latest campaign, Reynolds ransomware not only deploys the NsecSoft NSecKrnl driver but also terminates critical security processes. This includes those from prominent security vendors such as Avast, CrowdStrike Falcon, and Palo Alto Networks Cortex XDR. The driver exploits a known vulnerability (CVE-2025-68947) to disable these protective measures.

This tactic of embedding the evasion component within the ransomware itself complicates defensive measures. It reduces the need for attackers to separately install additional tools, thus minimizing detection risks. The Reynolds attack campaign also revealed the presence of a suspicious side-loaded loader on targeted networks weeks before the ransomware deployment.

Broader Implications and Recent Trends

The use of BYOVD is favored by attackers due to its effectiveness in evading security systems while utilizing legitimate signed files. This integration of evasion techniques directly into ransomware payloads offers a quieter approach, reducing the visibility of the attack.

Recent developments in ransomware strategies show an increased focus on targeting cloud services and leveraging native cloud features to compromise data. Meanwhile, phishing campaigns and the use of virtual machines for delivering malicious payloads have become more prevalent. These tactics highlight the ongoing evolution and professionalization of ransomware operations.

According to recent data, ransomware activities have surged, with new groups emerging and existing ones forming alliances. The average ransom payment has also seen a notable increase, underscoring the growing financial impact of these cyber threats.

As ransomware tactics become more sophisticated, staying informed and vigilant is crucial for organizations to protect themselves against potential threats.

The Hacker News Tags:BYOVD, Carbon Black, Cybersecurity, EDR, endpoint security, Malware, ransomware tactics, Reynolds ransomware, Symantec, vulnerable drivers

Post navigation

Previous Post: VoidLink Linux Malware: AI-Driven Multi-Cloud Threat
Next Post: Pakistan-Linked Cyber Espionage Targets India’s Defense

Related Posts

AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation The Hacker News
Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks Chinese Hackers Exploit Trimble Cityworks Flaw to Infiltrate U.S. Government Networks The Hacker News
Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware Iranian Hackers Maintain 2-Year Access to Middle East CNI via VPN Flaws and Malware The Hacker News
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News
Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page Click Studios Patches Passwordstate Authentication Bypass Vulnerability in Emergency Access Page The Hacker News
ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability ASD Warns of Ongoing BADCANDY Attacks Exploiting Cisco IOS XE Vulnerability The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft
  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark