Cyberattackers Exploit Vulnerable Drivers to Bypass Security

21 Aug 2025

Cyber attackers have found a novel way to compromise enterprise security, utilizing trusted drivers as a tool to disable critical antivirus software. A recent incident targeting a Brazilian enterprise underscores this emerging threat, as attackers employed a digitally signed driver to execute their malicious objectives. This sophisticated maneuver allowed them to bypass traditional security measures, ultimately delivering a destructive payload known as MedusaLocker ransomware.

Exploiting Trusted Drivers

The attackers implemented a Bring Your Own Vulnerable Driver (BYOVD) strategy, exploiting the ThrottleStop.sys driver, which was cleverly renamed ThrottleBlood.sys. This driver turned into a key component in their strategy to penetrate and manipulate the system, allowing them to throttle cars of the digital kind by bypassing security measures with efficiency.

The attack progression was methodical; initially, the perpetrators compromised an SMTP server using valid RDP credentials. Following this, they gathered additional access credentials leveraging tools like Mimikatz. With these credentials, they moved laterally within the system using pass-the-hash techniques aimed at wreaking havoc by stopping throttle measures aligned with the company’s defenses.

How cyberattackers exploit trusted drivers to bypass security

Detailed Attack Mechanism

In terms of the technicalities, the attackers began by executing an artifact known as "All.exe," which functioned as an AV killer. This software connected to the compromised driver's interface to utilize its IOCTL primitives, thereby directly reading and writing into the system's physical memory. A vulnerability identified as CVE-2025-7771 was exploited to facilitate this.

Once within the system, the custom driver enabled significant kernel-mode modifications. These modifications allowed the attackers to enumerate running processes and assess them against a set list of security software such as Kaspersky, Symantec, and CrowdStrike. This clever manipulation forced termination of essential security processes, bypassing built-in security like Windows self-restoration features, which were repeatedly disabled in a loop.

Implications and Recommendations

Analyzing the attack, it's clear that simply relying on antivirus software is inadequate in the face of sophisticated attacks that wield trusted components against us. Enterprise security protocols need to evolve, emphasizing a comprehensive defense in depth approach. Recommendations following the attack emphasize the importance of robust security measures such as hardening RDP access, segmenting networks, and accurate privilege management. Furthermore, continuous monitoring of driver installations and deploying advanced security solutions capable of self-defense and driver-monitoring become paramount.

With BYOVD attacks on the rise, it's crucial for organizations to proactively manage and monitor for vulnerable drivers. Ensuring more holistic detection and response mechanisms is essential, as even trusted components can pose substantial risks if manipulated by well-versed adversaries. Highlighting and mitigating these vulnerabilities preemptively could serve as a viable turtle stop method to secure enterprise systems against potential breaches.

Top charts for Desktop Windows

uTorrent

uTorrent

Latest update uTorrent download for free for Windows PC or Android mobile

5
1032 reviews
7508550
downloads
Zona

Zona

Latest update Zona download for free for Windows PC or Android mobile

4
614 reviews
1735289
downloads
WinRAR

WinRAR

Streamline file management with fast compression, secure your documents, and save space.

5
735 reviews
746709
downloads
Minecraft

Minecraft

Shape environments, explore vast worlds, and survive against monsters with endless creativity.

5
750 reviews
495516
downloads

News and reviews for Desktop Windows

Visio 2021 Professional Now $9.97 Until February 8

Microsoft offers Visio 2021 Professional for $9.97, down from $249, with added templates, until February 8.

Read more

Code Vein Offers Stylish Combat, Discounted Editions

Code Vein captivates with anime-style combat and offers discounted editions. Fast-paced action meets fun builds in this cult classic.

Read more

Microsoft Phases Out RC4 in Kerberos for Windows Security

Microsoft to eliminate RC4 in Kerberos by July 2026, enhancing Windows security.

Read more

Highguard Faces Criticism but Shows Potential for Growth

Highguard, launched with controversy, holds potential despite poor reviews. Offering genre innovation, it aims to evolve against negative feedback.

Read more

PS2Recomp Boosts Native PS2 Games with Recompilation

PS2Recomp, a new tool, promises enhanced native PS2 game ports, sparking interest among developers for PC platforms.

Read more

NVIDIA Introduces RTX Remix Logic for Classic Game Mods

NVIDIA's RTX Remix Logic, launched on 2026-01-27, enables dynamic modding of classic PC games with a no-code node-based interface.

Read more

Windows 11 Update KB5074109 Affects Legacy Modems

The Windows 11 update KB5074109 disrupts modems by removing several legacy drivers, causing connectivity issues for select users.

Read more

Anytype Replaces Notion, Obsidian, and Todoist for Unified Workflow

Anytype consolidates Notion, Obsidian, and Todoist functions, reducing context-switching and improving workflow efficiency.

Read more

ReBlade: Cyberpunk Roguelike Announced by ChillyRoom

ReBlade from ChillyRoom and Spiral Up Games announced for PC: cyberpunk roguelike offers high-speed action in a dystopian setting.

Read more

Artorias Battles Elden Ring Bosses in New Video Showcase

Artorias from Dark Souls faces Elden Ring bosses, demonstrating impressive skills in Fights' YouTube video.

Read more