Apr 06, 2026 • [email protected] (The Hacker News)
Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
Qilin and Warlock ransomware operators are leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to neutralize over 300 endpoint detection and...
Executive Summary
Qilin and Warlock ransomware operators are leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to neutralize over 300 endpoint detection and response (EDR) tools on compromised systems. According to research from Cisco Talos and Trend Micro, these threat actors exploit vulnerable drivers to bypass security controls, enabling them to operate undetected during ransomware attacks. Qilin specifically deploys a malicious DLL named 'msimg32.dll' to disable security mechanisms. Organizations should ensure EDR solutions are configured to monitor driver loading activities, maintain updated allowlists for trusted drivers, and implement application whitelisting to mitigate BYOVD risks.
Summary
Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro. Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named "msimg32.dll,"
Published Analysis
Qilin and Warlock ransomware operators are leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to neutralize over 300 endpoint detection and response (EDR) tools on compromised systems. According to research from Cisco Talos and Trend Micro, these threat actors exploit vulnerable drivers to bypass security controls, enabling them to operate undetected during ransomware attacks. Qilin specifically deploys a malicious DLL named 'msimg32.dll' to disable security mechanisms. Organizations should ensure EDR solutions are configured to monitor driver loading activities, maintain updated allowlists for trusted drivers, and implement application whitelisting to mitigate BYOVD risks. Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro. Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named "msimg32.dll," Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro. Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named "msimg32.dll,"
Linked Entities
- msimg32.dll
- Qilin
- Warlock