← Back to BrewedIntel
malwarehighDriver ExploitationEDR Evasion

Mar 19, 2026 • ESET WeLiveSecurity

EDR killers explained: Beyond the drivers

ESET researchers have published an analysis detailing the ecosystem surrounding EDR killers, focusing on how attackers abuse vulnerable drivers to bypass...

Source
ESET WeLiveSecurity
Category
malware
Severity
high

Executive Summary

ESET researchers have published an analysis detailing the ecosystem surrounding EDR killers, focusing on how attackers abuse vulnerable drivers to bypass security controls. This technique allows malicious actors to disable endpoint detection and response solutions, significantly increasing the risk of successful intrusions. By exploiting legitimate but vulnerable drivers, adversaries can achieve kernel-level access to terminate security processes. This represents a critical challenge for organizations relying on standard EDR agents without additional hardening. The severity is high due to the potential for complete defense neutralization. Mitigation requires strict management of signed drivers, monitoring for known vulnerable versions, and implementing deeper kernel protection. Although specific threat actors are not named in this excerpt, the methodology is commonly associated with advanced campaigns. Security teams must prioritize identifying and blocking these driver vulnerabilities to maintain effective defense postures against evolving evasion techniques utilized by attackers.

Summary

ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers

Published Analysis

ESET researchers have published an analysis detailing the ecosystem surrounding EDR killers, focusing on how attackers abuse vulnerable drivers to bypass security controls. This technique allows malicious actors to disable endpoint detection and response solutions, significantly increasing the risk of successful intrusions. By exploiting legitimate but vulnerable drivers, adversaries can achieve kernel-level access to terminate security processes. This represents a critical challenge for organizations relying on standard EDR agents without additional hardening. The severity is high due to the potential for complete defense neutralization. Mitigation requires strict management of signed drivers, monitoring for known vulnerable versions, and implementing deeper kernel protection. Although specific threat actors are not named in this excerpt, the methodology is commonly associated with advanced campaigns. Security teams must prioritize identifying and blocking these driver vulnerabilities to maintain effective defense postures against evolving evasion techniques utilized by attackers. ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers ESET researchers dive deeper into the EDR killer ecosystem, disclosing how attackers abuse vulnerable drivers