← Back to BrewedIntel
malwarehighBYOVD AttackEDR BypassRansomwaremsimg32.dllQilinWarlock

Apr 06, 2026 • [email protected] (The Hacker News)

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

Qilin and Warlock ransomware operators are leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to neutralize over 300 endpoint detection and...

Source
The Hacker News
Category
malware
Severity
high

Executive Summary

Qilin and Warlock ransomware operators are leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to neutralize over 300 endpoint detection and response (EDR) tools on compromised systems. According to research from Cisco Talos and Trend Micro, these threat actors exploit vulnerable drivers to bypass security controls, enabling them to operate undetected during ransomware attacks. Qilin specifically deploys a malicious DLL named 'msimg32.dll' to disable security mechanisms. Organizations should ensure EDR solutions are configured to monitor driver loading activities, maintain updated allowlists for trusted drivers, and implement application whitelisting to mitigate BYOVD risks.

Summary

Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro. Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named "msimg32.dll,"

Published Analysis

Qilin and Warlock ransomware operators are leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique to neutralize over 300 endpoint detection and response (EDR) tools on compromised systems. According to research from Cisco Talos and Trend Micro, these threat actors exploit vulnerable drivers to bypass security controls, enabling them to operate undetected during ransomware attacks. Qilin specifically deploys a malicious DLL named 'msimg32.dll' to disable security mechanisms. Organizations should ensure EDR solutions are configured to monitor driver loading activities, maintain updated allowlists for trusted drivers, and implement application whitelisting to mitigate BYOVD risks. Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro. Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named "msimg32.dll," Threat actors associated with Qilin and Warlock ransomware operations have been observed using the bring your own vulnerable driver (BYOVD) technique to silence security tools running on compromised hosts, according to findings from Cisco Talos and Trend Micro. Qilin attacks analyzed by Talos have been found to deploy a malicious DLL named "msimg32.dll,"

Linked Entities

  • msimg32.dll
  • Qilin
  • Warlock