Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ Security Tools

Cybersecurity researchers have uncovered new attack techniques used by the Qilin and Warlock ransomware groups, showing how they are bypassing modern security defenses by exploiting vulnerable system drivers. The attackers are leveraging a method known as “bring your own vulnerable driver” (BYOVD) to disable endpoint protection mechanisms before launching ransomware attacks.

In Qilin-related incidents, researchers observed the deployment of a malicious DLL file named “msimg32.dll,” which is executed through DLL side-loading to initiate a multi-stage infection process. This loader prepares the system for the main payload while evading detection by suppressing system logs, neutralizing monitoring hooks, and hiding execution patterns.

Once active, the malware uses compromised but legitimately signed drivers to gain deep system-level access. These drivers enable attackers to terminate processes linked to more than 300 endpoint detection and response (EDR) tools, effectively blinding security systems and allowing the ransomware to operate undetected.

The Qilin group is also known to rely on stolen credentials to gain initial access to targeted systems. After infiltration, attackers focus heavily on post-compromise activities, expanding control within the network before triggering ransomware. Notably, researchers found that ransomware execution is often delayed by nearly six days after the initial breach, increasing the overall impact of the attack.

Meanwhile, the Warlock ransomware group has been observed exploiting unpatched Microsoft SharePoint servers and adopting similar BYOVD techniques to disable security products at the kernel level. The group has also incorporated tools such as PsExec for lateral movement, Rclone for data exfiltration, and Cloudflare Tunnel for maintaining command-and-control communication.

Security experts warn that these tactics represent a significant evolution in ransomware operations, as attackers are now prioritizing the complete shutdown of defensive systems before deploying encryption payloads. This approach reduces the likelihood of early detection and increases the success rate of attacks.

To mitigate such threats, organizations are advised to strictly control driver installations, allow only trusted and signed drivers, and monitor unusual system-level activities. The findings highlight the growing sophistication of ransomware campaigns and the urgent need for stronger endpoint security and proactive threat detection strategies.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the report 2026

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch