Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Qilin and Warlock Ransomware Exploit Driver Vulnerabilities

Qilin and Warlock Ransomware Exploit Driver Vulnerabilities

Posted on April 6, 2026 By CWS

Recent reports highlight the increasing threat posed by the Qilin and Warlock ransomware groups, who have adopted the bring your own vulnerable driver (BYOVD) method to undermine security defenses. According to investigations by Cisco Talos and Trend Micro, these groups are leveraging this technique to disable security tools on compromised systems effectively.

Ransomware Techniques and Strategies

Qilin’s strategy involves deploying a malicious DLL file, ‘msimg32.dll’, to initiate a complex infection process aimed at disabling endpoint detection and response (EDR) solutions. This DLL, implemented through DLL side-loading, can terminate over 300 EDR drivers from various security vendors, severely impacting system defenses.

The first phase of this attack utilizes a PE loader to set up the environment for the EDR disabling component. Researchers Takahiro Takeda and Holger Unterbrink from Talos explain that the secondary payload is encrypted within this loader. The DLL loader employs multiple evasion techniques, such as bypassing user-mode hooks and suppressing Event Tracing for Windows logs, allowing the EDR disabling payload to execute stealthily in memory.

Exploiting Driver Vulnerabilities

Once activated, the malware utilizes two key drivers: ‘rwdrv.sys’, a modified ‘ThrottleStop.sys’, for accessing physical memory, and ‘hlpdrv.sys’, to terminate processes linked to numerous EDR drivers. These drivers have been previously used in other BYOVD attacks, notably by the Akira and Makop ransomware groups.

The EDR disabling component unregisters monitoring callbacks before loading the second driver, allowing the malware to terminate processes without hindrance. Talos highlights the sophisticated methods these malware employ to bypass modern EDR protections.

Prevention and Future Outlook

Statistics from CYFIRMA and Cynet reveal that Qilin has been notably active, linked to 22 out of 134 ransomware incidents in Japan in 2025, accounting for 16.4% of attacks. Qilin primarily uses stolen credentials for initial access, focusing on post-compromise activities to expand its influence and maximize impact. On average, ransomware deployment occurs six days after initial compromise, underscoring the need for early detection and prevention strategies.

Simultaneously, the Warlock ransomware group continues to exploit unpatched Microsoft SharePoint servers while updating its toolset for enhanced persistence and movement. This includes using TightVNC for control and the NSec driver in BYOVD attacks to disable kernel-level security products.

Organizations are advised to permit only signed drivers from trusted publishers and monitor driver installation events rigorously. Maintaining an updated patch management schedule is crucial, particularly for software with exploitable driver components. Trend Micro emphasizes a multilayered defense approach focusing on kernel integrity to counter these threats effectively.

The Hacker News Tags:BYOVD, Cybersecurity, driver vulnerabilities, EDR tools, endpoint security, Malware, Qilin, Ransomware, security threats, Warlock

Post navigation

Previous Post: Hackers Exploit Fake Microsoft Teams Domains for Attacks
Next Post: Strapi Ecosystem Hit by Malicious NPM Package Attack

Related Posts

Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers The Hacker News
BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. The Hacker News
Critical Security Threats and Global Cyber Developments Critical Security Threats and Global Cyber Developments The Hacker News
CISA Flags Critical F5 BIG-IP Vulnerability Exploitation CISA Flags Critical F5 BIG-IP Vulnerability Exploitation The Hacker News
Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails The Hacker News
Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning Critical CVE-2025-5086 in DELMIA Apriso Actively Exploited, CISA Issues Warning The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials
  • Google Awards $17M Through Bug Bounty Program in 2025
  • Strapi Ecosystem Hit by Malicious NPM Package Attack
  • Qilin and Warlock Ransomware Exploit Driver Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Node.js Maintainers Targeted by North Korean Hackers
  • LiteLLM Attack Exploits Developer Machines for Credentials
  • Google Awards $17M Through Bug Bounty Program in 2025
  • Strapi Ecosystem Hit by Malicious NPM Package Attack
  • Qilin and Warlock Ransomware Exploit Driver Vulnerabilities

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark