Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Qilin and Warlock Ransomware Exploit Driver Vulnerabilities

Qilin and Warlock Ransomware Exploit Driver Vulnerabilities

Posted on April 6, 2026 By CWS

Recent reports highlight the increasing threat posed by the Qilin and Warlock ransomware groups, who have adopted the bring your own vulnerable driver (BYOVD) method to undermine security defenses. According to investigations by Cisco Talos and Trend Micro, these groups are leveraging this technique to disable security tools on compromised systems effectively.

Ransomware Techniques and Strategies

Qilin’s strategy involves deploying a malicious DLL file, ‘msimg32.dll’, to initiate a complex infection process aimed at disabling endpoint detection and response (EDR) solutions. This DLL, implemented through DLL side-loading, can terminate over 300 EDR drivers from various security vendors, severely impacting system defenses.

The first phase of this attack utilizes a PE loader to set up the environment for the EDR disabling component. Researchers Takahiro Takeda and Holger Unterbrink from Talos explain that the secondary payload is encrypted within this loader. The DLL loader employs multiple evasion techniques, such as bypassing user-mode hooks and suppressing Event Tracing for Windows logs, allowing the EDR disabling payload to execute stealthily in memory.

Exploiting Driver Vulnerabilities

Once activated, the malware utilizes two key drivers: ‘rwdrv.sys’, a modified ‘ThrottleStop.sys’, for accessing physical memory, and ‘hlpdrv.sys’, to terminate processes linked to numerous EDR drivers. These drivers have been previously used in other BYOVD attacks, notably by the Akira and Makop ransomware groups.

The EDR disabling component unregisters monitoring callbacks before loading the second driver, allowing the malware to terminate processes without hindrance. Talos highlights the sophisticated methods these malware employ to bypass modern EDR protections.

Prevention and Future Outlook

Statistics from CYFIRMA and Cynet reveal that Qilin has been notably active, linked to 22 out of 134 ransomware incidents in Japan in 2025, accounting for 16.4% of attacks. Qilin primarily uses stolen credentials for initial access, focusing on post-compromise activities to expand its influence and maximize impact. On average, ransomware deployment occurs six days after initial compromise, underscoring the need for early detection and prevention strategies.

Simultaneously, the Warlock ransomware group continues to exploit unpatched Microsoft SharePoint servers while updating its toolset for enhanced persistence and movement. This includes using TightVNC for control and the NSec driver in BYOVD attacks to disable kernel-level security products.

Organizations are advised to permit only signed drivers from trusted publishers and monitor driver installation events rigorously. Maintaining an updated patch management schedule is crucial, particularly for software with exploitable driver components. Trend Micro emphasizes a multilayered defense approach focusing on kernel integrity to counter these threats effectively.

The Hacker News Tags:BYOVD, Cybersecurity, driver vulnerabilities, EDR tools, endpoint security, Malware, Qilin, Ransomware, security threats, Warlock

Post navigation

Previous Post: Hackers Exploit Fake Microsoft Teams Domains for Attacks
Next Post: Strapi Ecosystem Hit by Malicious NPM Package Attack

Related Posts

Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity Salesforce Flags Unauthorized Data Access via Gainsight-Linked OAuth Activity The Hacker News
Key Capabilities Security Leaders Need to Know Key Capabilities Security Leaders Need to Know The Hacker News
New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy in Russia-Focused Cyberattacks The Hacker News
Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks Hackers Access SonicWall Cloud Firewall Backups, Spark Urgent Security Checks The Hacker News
ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices ViciousTrap Uses Cisco Flaw to Build Global Honeypot from 5,300 Compromised Devices The Hacker News
Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure Fortra GoAnywhere CVSS 10 Flaw Exploited as 0-Day a Week Before Public Disclosure The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Optimize SOC Efficiency by Tackling Multi-OS Threats
  • Dgraph Database Flaw Endangers Security with Bypass Vulnerability
  • Critical Flaws in Apache Traffic Server Demand Immediate Updates
  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Optimize SOC Efficiency by Tackling Multi-OS Threats
  • Dgraph Database Flaw Endangers Security with Bypass Vulnerability
  • Critical Flaws in Apache Traffic Server Demand Immediate Updates
  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark