TECHNOLOGY
Hackers exploit Intel driver to disable Windows Defender
USATue Sep 02 2025
A hacker group has discovered a clever method to disable Windows Defender by exploiting a legitimate Intel driver. This technique, known as a "Bring Your Own Vulnerable Driver" (BYOVD) attack, has been active since mid-July 2025 and is being used in ransomware campaigns.
How the Attack Works
Exploiting a Legitimate Driver
- The attackers use a driver from Intel's ThrottleStop, a performance-tweaking tool, to gain deep system access.
- Once access is obtained, they install a second driver that disables Microsoft Defender by modifying a Windows registry setting.
A Sneaky Approach
- Unlike traditional attacks that exploit software bugs or deliver malicious files, this method abuses the design of the Windows driver system.
- Since the driver is from a trusted source, Windows allows it to run without raising suspicions.
Broader Implications
- The attack highlights a flaw in how Windows trusts certain tools, allowing legitimate drivers to be weaponized.
- The same group has also been linked to attacks on SonicWall VPN devices, likely exploiting a known vulnerability rather than a zero-day flaw.
Recommended Defenses
- Restrict VPN access
- Enable multi-factor authentication (MFA)
- Disable unused accounts
- Monitor for suspicious activity
- Apply filtering and blocking rules
- Download software only from official or verified sources
Staying Safe
While this attack is dangerous, users can protect themselves by:
- Using strong antivirus software
- Avoiding shady links
- Not running unexpected commands
- Keeping software updated
- Using two-factor authentication
- Investing in personal data removal services
continue reading...
questions
How can users verify the authenticity and safety of software drivers before installation?
What measures can be taken to ensure that legitimate drivers are not exploited for malicious purposes?
How effective are current antivirus solutions in detecting and preventing BYOVD attacks?
actions
flag content