Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Why a decade-old EnCase driver still works as an EDR killer
    Cybersecurity

    Why a decade-old EnCase driver still works as an EDR killer

    adminBy adminFebruary 5, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Why a decade-old EnCase driver still works as an EDR killer
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Attackers are leaning on a new EDR killer malware that can shut down 59 widely used endpoint security products by misusing a kernel driver that once shipped with Guidance Software’s EnCase digital forensics tool, Huntress researchers warn.

    This particular driver is legitimate but its certificate expired and was revoked more than ten years ago. Even so, Windows still allows it to load.

    The attack

    Huntress’ security experts spotted this intrusion earlier this month, and discovered that the attackers:

    • Gained access to the victim organization’s network by successfully authenticating to the SonicWall SSLVPN with previously compromised credentials
    • Performed network reconnaissance
    • Loaded the EDR killer, with the vulnerable kernel driver embedded in it

    A custom encoding scheme hides the encoded driver from security solutions.

    After decoding the driver, the malware writes it to disk under a path that looks like a legitimate OEM component, hides the file, and copies timestamps from a real system file so it blends in. It then registers the driver as a Windows kernel service to ensure it loads on every reboot.

    “Once loaded, the driver exposes an IOCTL interface that allows usermode processes to terminate arbitrary processes directly from kernel mode. This bypasses all usermode protections, including Protected Process Light (PPL) that typically guards critical system processes and EDR agents,” the researchers explained.

    Why BYOVD still works on modern Windows systems

    The Bring Your Own Vulnerable Driver (BYOVD) technique is a way for attackers to gain deep system access by abusing trusted but flawed Windows drivers. Instead of writing their own malicious driver, they bring along a legitimate one that was originally created by a hardware vendor or software company.

    Once the vulnerable driver is running in the kernel, attackers can use its bugs or exposed functions to, for example, kill security processes, disable protections, or read and write directly to memory.

    Defenders have known about BYOVD for years, but stopping it at scale is difficult.

    Windows’ Driver Signature Enforcement (DSE) feature is good at spotting unsigned or tampered kernel drivers, but the kernel does not check Certificate Revocation Lists.

    “This limitation exists for practical reasons: drivers load early in the boot process before network services are available, and CRL checks would significantly impact boot performance. Even when a CRL is manually imported into local certificate storage, the kernel bypasses this check entirely,” the researchers explained.

    Instead, Microsoft has decided that it would create and constantly update the Vulnerable Driver Blocklist, with comes with an obvious drawback: only known-bad drivers are on it, which means that attackers have a window of opportunity until the driver they use ends up on it.

    In addition to all this, Microsoft allows for exceptions to maintain backward compatibility.

    “Drivers signed with certificates issued before July 29, 2015, that chain to a supported cross-signed certificate authority] are still permitted to load,” the researchers noted.

    “The EnCase driver’s certificate was issued on December 15, 2006, well before this cutoff.”

    Blocking vulnerable drivers

    Huntress believe that the attackers’ ultimate goal was to deploy ransomware on the target organization’s computers, but the attack was thwarted in the preparation stage.

    They advise organizations to enable multi-factor authentication on all remote access services and review VPN logs for suspicious activity.

    Defenders should also turn on Memory Integrity so Microsoft’s Vulnerable Driver Blocklist is enforced, monitor for suspicious services that mimic legitimate hardware components, and use Windows Defender Application Control and Attack Surface Reduction rules to prevent known vulnerable drivers to be loaded and exploited.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    decadeold driver EDR EnCase killer Works
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleHow to Choose the Best Prompts to Monitor Your AI Search Visibility
    Next Article How ‘Exercise Snacking’ Can Get You Into Working Out
    admin
    • Website

    Related Posts

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    CyberStrikeAI tool adopted by hackers for AI-powered attacks

    March 3, 2026

    Madison Square Garden Data Breach Confirmed Months After Hacker Attack

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Segway Cube 1000 Portable Power Station hits lowest price ever!

    March 3, 2026

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026

    Amazon Prime Members Can Get Two of These E-Books Free in March 2026

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (570)
    • Privacy & Online Earning (79)
    • SEO & Digital Marketing (356)
    • Tech Tools & Mobile / Apps (707)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Segway Cube 1000 Portable Power Station hits lowest price ever!

    March 3, 2026

    How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer

    March 3, 2026

    Building a competitive PPC defense

    March 3, 2026
    Most Popular
    • Segway Cube 1000 Portable Power Station hits lowest price ever!
    • How Microsoft, partners are tackling ‘huge, huge task’ of making security software safer
    • Building a competitive PPC defense
    • Amazon Prime Members Can Get Two of These E-Books Free in March 2026
    • CyberStrikeAI tool adopted by hackers for AI-powered attacks
    • 16 Best Checking Accounts of March 2026
    • 3 great Paramount+ movies you’ll want to watch this week (March 2
    • Nvidia partners with optics technology vendors Lumentum and Coherent to enhance AI infrastructure
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.