> Back to All Posts

New EDR-Killer Tool Used by Eight Ransomware Gangs

Edr-killer

A newly discovered EDR-killer tool is being actively deployed by at least eight different ransomware groups to disable antivirus and endpoint detection systems during attacks. The tool exploits a Bring Your Own Vulnerable Driver (BYOVD) method, allowing threat actors to neutralize even the most well-known security software.

Shared but customized for each attack

According to security researchers at Sophos, this tool is not a one-size-fits-all malware. Each ransomware group appears to be using a uniquely compiled version, which strongly suggests a shared framework rather than a leaked binary. Sophos first noticed the tool being used by the RansomHub gang and later observed similar variants employed by other ransomware groups, including:

  • BlackSuit
  • Medusa
  • Qilin
  • Dragonforce
  • Crytox
  • Lynx
  • INC

Each group is believed to have received the tool through private sharing, potentially indicating collaboration or access to a paid service.

How the tool works

The EDR-killer is delivered as a heavily obfuscated binary that self-decodes during execution. Once active, it injects itself into legitimate processes and searches for a hardcoded, signed driver file, usually given a randomly generated five-character filename.

Using the BYOVD technique, the tool then loads a vulnerable or stolen signed driver into the Windows kernel. In many observed cases, it impersonates legitimate drivers, such as the CrowdStrike Falcon Sensor Driver, to elevate privileges and disable security processes without detection.

Disabling top security tools

The goal of the tool is to cripple antivirus and EDR systems before deploying the ransomware payload. It targets a broad range of security products, including:

  • Microsoft Defender
  • Sophos
  • SentinelOne
  • Cylance
  • Kaspersky
  • Trend Micro
  • Webroot
  • Symantec
  • McAfee
  • HitmanPro
  • F-Secure

By terminating their processes or services at the kernel level, the ransomware can operate without interference.

Growing trend of modular offensive tools

This tool follows the path of previously seen attack frameworks like EDRKillShifter, AuKill, and AvNeutralizer, which were also shared among ransomware operators. These tools are increasingly modular and easy to adapt, making them attractive to multiple groups seeking stealthy, reliable ways to bypass security controls.

Defenders urged to act

Sophos has published technical details and Indicators of Compromise (IOCs) to help defenders recognize the tool’s usage in the wild. Organizations are encouraged to monitor for signs of suspicious driver installations, especially during initial stages of compromise.

Final Thoughts

The emergence of this new EDR-killer tool marks another escalation in the cybercriminal ecosystem. With at least eight ransomware gangs now using customized builds, the tool’s distribution model suggests a thriving underground market for security-disabling malware. Enterprises must prioritize driver integrity monitoring, kernel-level visibility, and rapid threat response mechanisms to stay ahead of this evolving threat.

Janet Andersen

Janet is an experienced content creator with a strong focus on cybersecurity and online privacy. With extensive experience in the field, she’s passionate about crafting in-depth reviews and guides that help readers make informed decisions about digital security tools. When she’s not managing the site, she loves staying on top of the latest trends in the digital world.