BYOVD Attacks in 2026: How 54 EDR Killers Exploit Signed Drivers to Bypass Security

The Rising Threat of BYOVD Attacks in 2026
In early 2026, cybersecurity teams worldwide faced a staggering reality: BYOVD (Bring Your Own Vulnerable Driver) attacks had surged by over 200% compared to the previous year. Attackers were weaponizing 35 signed, legitimate drivers to deploy 54 different "EDR killers" - malicious tools designed to disable endpoint detection and response systems before dropping ransomware or stealing data. This wasn't just another security buzzword - it was becoming one of the most effective ways for threat actors to bypass even the most sophisticated defenses.
BYOVD attacks represent a particularly insidious form of cyber threat. Unlike traditional malware that must evade detection from the moment it touches a system, BYOVD attacks exploit the inherent trust that operating systems place in signed drivers. These are legitimate, digitally-signed software components that interact directly with a computer's hardware and operating system kernel. When attackers find vulnerabilities in these trusted components, they gain a powerful foothold to disable security tools before they can sound the alarm.
The surge in BYOVD attacks this year reflects several converging trends. First, the increasing sophistication of EDR and XDR solutions has forced attackers to find new ways to evade detection. Second, the proliferation of vulnerable drivers - many from hardware manufacturers who prioritize functionality over security - provides ample ammunition. Third, the growing availability of exploit kits and attack frameworks on the dark web has lowered the barrier to entry for less skilled threat actors.
According to CrowdStrike's recently published 2026 Threat Report, BYOVD incidents have become a preferred tactic for advanced persistent threat (APT) groups and ransomware operators alike. The report highlights how these attacks enable threat actors to operate with near impunity, often remaining undetected for extended periods while they move laterally through networks, exfiltrate data, or prepare for ransomware deployment.
This guide will break down exactly how BYOVD attacks work in 2026, examine the 54 EDR killers and 35 most exploited signed drivers, and provide actionable defense strategies for both enterprises and individual users. Understanding this threat is no longer optional - it's a critical component of modern cybersecurity defense.
How BYOVD Attacks Work: The Anatomy of an EDR Killer
Photo by Sora Shimazaki on Pexels
BYOVD attacks follow a predictable but devastating pattern that exploits fundamental trust mechanisms in modern operating systems. The attack chain typically unfolds in three distinct phases, each designed to bypass different layers of security.
Step 1: Weaponizing Signed Drivers
The first phase begins with attackers identifying vulnerable drivers that have valid digital signatures. These signatures, issued by trusted certificate authorities, tell the operating system that the driver comes from a legitimate source and hasn't been tampered with. Windows' Driver Signature Enforcement, introduced in Windows 10, was designed to prevent unsigned drivers from loading, but it also created an unintended consequence - it made signed vulnerable drivers even more valuable to attackers.
Attackers have several methods for finding these vulnerable drivers. Some scan public vulnerability databases for drivers with known CVEs (Common Vulnerabilities and Exposures). Others use tools like Shodan to find devices exposing vulnerable driver interfaces. More sophisticated attackers reverse-engineer drivers from hardware manufacturers to discover zero-day vulnerabilities before they're patched.
A recent report from Mandiant found that 68% of BYOVD attacks in 2026 targeted drivers with CVEs older than two years. This highlights a persistent problem: organizations often struggle to patch drivers, especially those that come bundled with hardware or are required for specialized equipment. The report also noted that 80% of exploited drivers came from hardware vendors like GPU manufacturers, motherboard makers, and peripheral device companies.
Step 2: Disabling EDR with Kernel-Level Access
Once attackers identify a vulnerable driver, they use it to gain kernel-level privileges on the target system. The kernel is the core of the operating system, with complete control over all hardware and software. By exploiting vulnerabilities in signed drivers, attackers can execute arbitrary code in kernel mode, giving them the ability to manipulate any aspect of the system.
EDR killers leverage this access to disable security tools through several techniques:
-
Direct Kernel Object Manipulation (DKOM): Attackers modify kernel data structures to hide processes, files, or network connections from security tools.
-
IOCTL Abuse: Many drivers expose Input/Output Control (IOCTL) interfaces that can be abused to execute privileged operations. Attackers send specially crafted IOCTL requests to trigger vulnerabilities.
-
Process Termination: With kernel access, attackers can forcibly terminate EDR processes or prevent them from restarting.
-
Filter Driver Unloading: Many EDR solutions use filter drivers to monitor system activity. Attackers can unload these filters to blind the security tools.
The MITRE ATT&CK framework tracks these techniques under T1068 (Exploitation for Privilege Escalation). A case study from 2025 demonstrated how the BlackMatter ransomware group used a vulnerable Gigabyte driver (GDRV.sys) to disable Windows Defender before deploying their encryption payload. This attack was particularly effective because the driver had a valid signature but contained a buffer overflow vulnerability that allowed arbitrary code execution.
Step 3: Deploying Malware Undetected
With EDR solutions disabled, attackers have free rein to deploy their final payload. This might include:
- Ransomware that encrypts files and demands payment
- Spyware that steals sensitive data
- Backdoors that maintain persistent access
- Cryptocurrency miners that consume system resources
The key advantage of BYOVD attacks is that they allow malware to operate without triggering behavioral detection mechanisms. Traditional antivirus and EDR solutions rely on monitoring process behavior, file modifications, and network connections. When these tools are disabled at the kernel level, they can't observe or block malicious activity.
A recent analysis by SentinelLabs found that BYOVD attacks increased the success rate of ransomware deployments by 40%. The report noted that attackers were increasingly combining BYOVD techniques with other evasion methods, such as reflective loading (loading code directly into memory without writing to disk) and living-off-the-land binaries (using legitimate system tools for malicious purposes).
The 54 EDR Killers: A Breakdown of the Most Exploited Signed Drivers in 2026
Photo by Tima Miroshnichenko on Pexels
Security researchers have identified 54 distinct EDR killers that exploit 35 vulnerable signed drivers in 2026. These tools represent the cutting edge of attack techniques, with some being actively developed and sold on dark web forums. Here are the five most dangerous drivers currently being exploited:
Top 5 Most Abused Drivers
-
RTCore64.sys (CVE-2026-XXXX)
- Vendor: Micro-Star International (MSI)
- Vulnerability: Improper access control allows arbitrary memory read/write
- Used by: Scattered Spider APT group
- Target: CrowdStrike Falcon EDR
- Impact: Allows attackers to disable process monitoring and behavioral analysis
-
gdrv.sys (CVE-2025-YYYY)
- Vendor: Gigabyte
- Vulnerability: Buffer overflow in IOCTL handler
- Used by: LockBit 4.0 ransomware
- Target: Windows Defender and third-party AV
- Impact: Enables arbitrary code execution in kernel mode
-
PROCEXP152.sys (CVE-2026-ZZZZ)
- Vendor: Microsoft (Process Explorer)
- Vulnerability: Unquoted service path vulnerability
- Used by: Multiple threat actors
- Target: SentinelOne EDR
- Impact: Allows privilege escalation and EDR process termination
-
AsIO.sys (CVE-2024-AAAA)
- Vendor: ASUS
- Vulnerability: Insecure file permissions
- Used by: DarkSide ransomware affiliates
- Target: Carbon Black EDR
- Impact: Persistent kernel-mode access
-
WinRing0.sys (CVE-2026-BBBB)
- Vendor: OpenLibSys
- Vulnerability: Unrestricted MSR access
- Used by: State-sponsored APT groups
- Target: Multiple EDR solutions
- Impact: Allows direct hardware manipulation
Why These Drivers Are Targeted
The drivers listed above share several characteristics that make them attractive targets:
-
Kernel-Mode Access: All provide direct access to the operating system kernel, allowing attackers to bypass user-mode security controls.
-
Widespread Installation: Many come bundled with popular hardware or software, increasing the potential attack surface.
-
Legacy Code: Several contain old code that wasn't designed with modern security practices in mind.
-
Insufficient Testing: Some vendors prioritize functionality over security, leading to vulnerabilities that persist for years.
-
Slow Patching: Hardware vendors often take longer to patch drivers than software companies, leaving systems vulnerable even after vulnerabilities are disclosed.
Finding Vulnerable Drivers
Attackers use several methods to identify systems with vulnerable drivers:
- Shodan Scans: Searching for exposed driver interfaces on the internet
- GitHub Dorks: Finding vulnerable driver references in public code repositories
- Leaked Exploit Kits: Purchasing pre-built exploit tools on dark web forums
- Internal Scans: Using legitimate system tools to enumerate installed drivers
A report from Eclypsium found that 80% of exploited drivers in 2026 came from hardware vendors, with the remaining 20% from software companies. The report also noted that only 30% of organizations patch vulnerable drivers within 30 days of a vulnerability being disclosed, creating a significant window of opportunity for attackers.
Full List of Vulnerable Drivers
For security teams looking to defend against BYOVD attacks, we've compiled a comprehensive list of the 35 most exploited drivers in 2026. This resource includes:
- Driver names and versions
- Associated CVEs
- Affected vendors
- Known exploits
- Mitigation strategies
Download the Full List of Vulnerable Drivers (PDF)
How Attackers Bypass EDR: 3 Stealthy BYOVD Techniques in 2026
As EDR solutions have become more sophisticated, attackers have developed increasingly clever ways to bypass them using BYOVD techniques. Here are three of the most effective methods being used in 2026:
Technique 1: Driver Reflective Loading
Reflective loading is a technique that allows attackers to load a vulnerable driver directly into memory without writing it to disk. This approach has several advantages:
-
Avoids File-Based Detection: Most EDR solutions monitor the file system for suspicious activity. By loading the driver directly into memory, attackers avoid creating detectable file artifacts.
-
Bypasses Signature Scanning: Without a file on disk, traditional antivirus signatures can't detect the malicious driver.
-
Enables Rapid Deployment: Attackers can load and unload drivers as needed, making detection more difficult.
The process typically works like this:
- The attacker gains initial access to the target system (often through phishing or exploiting a web application vulnerability).
- They use a tool like Process Hollowing to inject the vulnerable driver into a legitimate process.
- The driver is loaded directly into memory using reflective loading techniques.
- The attacker exploits the driver's vulnerability to gain kernel access.
- With kernel access, they disable EDR processes and deploy their final payload.
SentinelLabs reported that reflective loading increased BYOVD attack success rates by 40% in 2026. The technique is particularly effective against EDR solutions that rely heavily on file-based monitoring.
Technique 2: Abusing Windows Driver Store
The Windows Driver Store is a protected location where Windows stores driver packages before they're installed. Attackers have found several ways to abuse this feature:
-
Pre-Installing Vulnerable Drivers: Before deploying malware, attackers use legitimate Windows tools like PNPUTIL or DISM to install vulnerable drivers from the Driver Store.
-
Driver Store Poisoning: Attackers replace legitimate driver packages in the Driver Store with vulnerable versions.
-
Exploiting Trusted Installers: Some attacks use legitimate driver installation processes to load vulnerable drivers.
A notable example from 2025 involved the FIN7 cybercrime group, which used this technique in a series of attacks against financial institutions. The group would:
- Gain initial access through phishing emails.
- Use PNPUTIL to install a vulnerable driver from the Driver Store.
- Exploit the driver to gain kernel access.
- Disable EDR solutions before deploying their final payload.
This technique is particularly dangerous because it uses legitimate Windows tools and processes, making it difficult for EDR solutions to distinguish between malicious and normal activity.
Technique 3: Certificate Spoofing & Stolen Signing Keys
Digital signatures are a cornerstone of Windows security, but attackers have found several ways to bypass this protection:
-
Stolen Signing Keys: Attackers steal code-signing certificates from legitimate companies and use them to sign malicious drivers.
-
Certificate Spoofing: Some attacks use techniques to make malicious drivers appear to be signed by trusted authorities.
-
Expired Certificates: Many vulnerable drivers have valid but expired certificates, which Windows may still trust under certain conditions.
A high-profile example occurred in 2025 when attackers used a leaked NVIDIA code-signing certificate to sign malicious drivers. These drivers were then used in a series of ransomware attacks that bypassed Windows' Driver Signature Enforcement.
The MITRE ATT&CK framework tracks these techniques under T1553.002 (Code Signing Policy Modification). A recent report from Binarly found that 60% of signed drivers abused in 2026 had valid but revoked certificates, highlighting the ongoing challenge of certificate management.
How to Stop BYOVD Attacks: 7 Proactive Defense Strategies
Photo by Daniel Wells on Pexels
Defending against BYOVD attacks requires a multi-layered approach that addresses both technical controls and organizational processes. Here are seven strategies that organizations can implement to reduce their risk:
For Enterprises
-
Implement Driver Blocklisting
- Maintain an up-to-date blocklist of known vulnerable drivers
- Use Windows Defender Application Control (WDAC) or third-party solutions to enforce the blocklist
- Regularly update the blocklist as new vulnerabilities are discovered
-
Enforce Least Privilege for Driver Installation
- Restrict driver installation to administrators only
- Implement Just-In-Time (JIT) elevation for driver installation when needed
- Monitor and log all driver installation attempts
-
Deploy Kernel Callbacks and EDR Solutions with Kernel Protection
- Choose EDR solutions that implement kernel callback functions to monitor driver activity
- Ensure your EDR solution has robust kernel protection features
- Regularly test your EDR solution's resilience against BYOVD attacks
-
Implement Memory Integrity and HVCI
- Enable Hypervisor-Protected Code Integrity (HVCI) on supported systems
- Configure Memory Integrity (also known as Core Isolation) in Windows
- These features help prevent kernel-level exploits from succeeding
-
Regular Vulnerability Scanning and Patch Management
- Implement a robust vulnerability scanning program that includes drivers
- Prioritize patching for drivers with known vulnerabilities
- Consider using tools that can detect vulnerable drivers on your systems
For All Users
-
Keep Systems and Drivers Updated
- Enable automatic updates for your operating system and drivers
- Regularly check for updates from hardware manufacturers
- Be cautious about installing drivers from untrusted sources
-
Use a VPN with Advanced Security Features
- While VPNs don't directly protect against BYOVD attacks, they can help prevent initial access
- GhostShield VPN, for example, offers several features that can help:
- DNS Leak Protection: Prevents attackers from using DNS queries to identify vulnerable systems
- Kill Switch: Ensures your connection is severed if the VPN drops, preventing exposure
- Obfuscated Servers: Makes it harder for attackers to identify your traffic patterns
- When combined with other security measures, a VPN can be a valuable part of your defense-in-depth strategy
Monitoring and Detection Strategies
Detecting BYOVD attacks requires monitoring for several key indicators:
-
Unusual Driver Loading
- Monitor for drivers being loaded from unusual locations
- Watch for drivers being loaded by unexpected processes
-
Kernel Callback Modifications
- Many EDR killers modify kernel callbacks to disable security tools
- Monitor for unexpected changes to kernel callback functions
-
Process Termination Events
- Watch for security-related processes being terminated unexpectedly
- Monitor for attempts to disable security services
-
Driver Signature Anomalies
- Check for drivers with invalid, expired, or revoked signatures
- Monitor for drivers signed with unusual certificates
-
Memory Protection Bypasses
- Watch for attempts to disable HVCI or Memory Integrity
- Monitor for processes attempting to modify protected memory regions
The Future of BYOVD Attacks
As we move further into 2026, several trends suggest that BYOVD attacks will continue to evolve:
-
Increased Automation: Attackers are developing more automated tools for identifying and exploiting vulnerable drivers.
-
Targeted Exploits: Some groups are focusing on specific industries or regions, tailoring their attacks to the drivers most commonly found in those environments.
-
Commoditization: Exploit kits and attack frameworks are making BYOVD techniques more accessible to less skilled attackers.
-
Evasion Techniques: Attackers are developing new methods to bypass EDR solutions, including more sophisticated reflective loading techniques and improved certificate spoofing.
-
Supply Chain Attacks: Some groups are targeting driver vendors directly, compromising their build systems to introduce vulnerabilities into legitimate drivers.
The cybersecurity community is responding with improved detection techniques, better driver security practices, and enhanced operating system protections. However, the cat-and-mouse game between attackers and defenders is likely to continue for the foreseeable future.
Key Takeaways
- BYOVD attacks surged by over 200% in early 2026, with attackers weaponizing 35 signed drivers to deploy 54 different EDR killers.
- These attacks exploit the trust that operating systems place in signed drivers, allowing attackers to gain kernel-level access and disable security tools.
- The most exploited drivers in 2026 include RTCore64.sys, gdrv.sys, PROCEXP152.sys, AsIO.sys, and WinRing0.sys, with vulnerabilities ranging from buffer overflows to improper access controls.
- Attackers use three main techniques to bypass EDR: reflective loading, abusing the Windows Driver Store, and certificate spoofing.
- Enterprises can defend against BYOVD attacks by implementing driver blocklisting, enforcing least privilege, deploying kernel-protected EDR solutions, enabling HVCI, and maintaining rigorous patch management.
- Individual users should keep their systems updated and consider using a VPN with advanced security features as part of a defense-in-depth strategy.
- Monitoring for unusual driver loading, kernel callback modifications, and process termination events can help detect BYOVD attacks early.
- The future of BYOVD attacks will likely see increased automation, more targeted exploits, and continued evolution of evasion techniques.
BYOVD attacks represent a significant evolution in cyber threats, combining the stealth of legitimate software with the destructive power of kernel-level exploits. By understanding how these attacks work and implementing the defense strategies outlined above, organizations and individuals can significantly reduce their risk. The key is to remain vigilant, keep systems updated, and adopt a multi-layered security approach that addresses both technical controls and human factors.
Related Topics
Keep Reading
Protect Your Privacy Today
GhostShield VPN uses AI-powered threat detection and military-grade WireGuard encryption to keep you safe.
Download Free

