Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware

Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware

Posted on January 21, 2026January 21, 2026 By CWS

A big-scale marketing campaign is popping a trusted Home windows safety driver right into a weapon that shuts down safety instruments earlier than ransomware and distant entry malware are dropped.

The assaults abuse truesight.sys, a kernel driver from Adlice Software program’s RogueKiller antivirus, and use greater than 2,500 validly signed variants to quietly disable endpoint detection and response (EDR) and antivirus options throughout Home windows methods.

The risk first gained wider consideration when Verify Level researchers uncovered how attackers had been abusing legacy driver signing guidelines to load pre-2015 signed drivers on trendy Home windows 11 machines.

By doing so, they might run the weak TrueSight driver with full kernel privileges, although Microsoft’s personal safety controls had been meant to dam dangerous drivers. The result’s a dependable option to kill safety instruments earlier than any payload is delivered.

Quickly after this exercise surfaced, MagicSword analysts famous that the motive force abuse had already unfold throughout a number of risk teams and areas, with contemporary driver variants showing week after week.

Their telemetry confirmed that financially motivated actors and superior persistent risk (APT) teams had been all adopting the identical methodology to clear the best way for ransomware and distant entry trojans on compromised hosts.

On the heart of this operation is the aptitude to terminate virtually any safety course of on the system.

The weak TrueSight 2.0.2 driver exposes an IOCTL command that accepts attacker-controlled enter and may forcibly kill chosen processes, together with protected EDR brokers and antivirus engines.

As soon as the motive force is loaded, the malware now not has to battle user-mode tamper protections, as a result of it operates immediately within the Home windows kernel with the identical privileges as respectable safety software program.

The influence is important for defenders. With EDR brokers shut down on the kernel degree, telemetry stops, alerts by no means hearth, and ransomware or distant entry trojans can execute with virtually no resistance.

Victims typically solely discover the assault when recordsdata are already encrypted or knowledge has been quietly exfiltrated.

The size of the motive force variants and the excessive evasion fee towards conventional antivirus make this method particularly harmful for enterprises that depend on hash-based or signature-only defenses.

An infection Chain: From Phishing to Full Management

The an infection chain behind these assaults follows a staged strategy that makes use of widespread supply strategies however {couples} them with superior driver abuse.

Preliminary entry typically begins with phishing emails, pretend obtain websites, or compromised Telegram channels that lure customers into operating a disguised installer.

This primary-stage executable acts as a downloader and fetches further parts from attacker-controlled servers, usually hosted on cloud infrastructure.

Within the second stage, the malware units up persistence by scheduled duties and DLL side-loading, making certain it survives reboots and blends in with regular system exercise.

It then deploys an EDR killer module that’s closely obfuscated with VMProtect to hinder reverse engineering.

MagicSword researchers recognized that this module targets almost 200 totally different safety merchandise, starting from CrowdStrike and SentinelOne to Kaspersky, Symantec, and plenty of others, making the marketing campaign efficient throughout various enterprise environments.

When prepared, the module downloads the TrueSight driver if it’s not already current, installs it as a Home windows service (generally named TCLService), and sends the crafted IOCTL request to terminate operating safety processes.

With defenses gone, the ultimate payload—typically a HiddenGh0st distant entry trojan or a ransomware household—runs with virtually no visibility.

From the preliminary phishing click on to full system management, this sequence can full in as little as half-hour, leaving a really small window for detection and response.

Observe us on Google Information, LinkedIn, and X to Get Extra Prompt Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Deploying, Endpoint, Hackers, Protection, Ransomware, Security, Terminate, Toolsto, Weaponized

Post navigation

Previous Post: New AI Malware Era Begins as Advanced VoidLink Malware Emerges as the First Fully AI-Driven Threat Framework
Next Post: Fortinet SSO Vulnerability Actively Exploited to Hack Firewalls and Gain Admin Access

Related Posts

Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Microsoft Asks IT Admins to Contact for Fix Related to Windows IIS Failure Issues Cyber Security News
Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks Impacket Tool in Kali Repo Upgraded With New Attack Paths and Relay Tricks Cyber Security News
INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen INE Highlights Enterprise Shift Toward Hands-On Training as Skills Gaps Widen Cyber Security News
Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets Cyber Security News
Hackers Exploit ZIP File Flaw to Evade Detection Hackers Exploit ZIP File Flaw to Evade Detection Cyber Security News
Hackers Exploit Next.js Repositories Targeting Developers Hackers Exploit Next.js Repositories Targeting Developers Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Linux Vulnerability Threatens System Security
  • The Gentlemen Ransomware: A Growing Cyber Threat
  • Criminal IP to Unveil AI Security Advances at Infosecurity Europe
  • Kimsuky Hackers Exploit LNK, JSE Lures Against Key Sectors
  • Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Linux Vulnerability Threatens System Security
  • The Gentlemen Ransomware: A Growing Cyber Threat
  • Criminal IP to Unveil AI Security Advances at Infosecurity Europe
  • Kimsuky Hackers Exploit LNK, JSE Lures Against Key Sectors
  • Trapdoor Android Fraud Scheme Hijacks 659 Million Daily Requests

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark