Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026

Here’s what you should know

February 6, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»DeadLock Ransomware Uses BYOVD to Evade Security Measures
News

DeadLock Ransomware Uses BYOVD to Evade Security Measures

Team-CWDBy Team-CWDDecember 11, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A new set of tactics linked to a financially motivated threat actor deploying DeadLock ransomware has been observed by cybersecurity researchers.

Detailed in the latest analysis from Cisco Talos, published today, the campaign used a Bring Your Own Vulnerable Driver (BYOVD) technique to disable endpoint detection tools and pave the way for full system compromise.

The actor combined privilege-escalation scripts, registry modifications, remote access tools (RATs) and a custom encryption routine to disrupt business operations while preserving system stability.

BYOVD Attack Enables Security Bypass

Talos reported that the attacker exploited a flaw in a Baidu Antivirus driver, tracked as CVE-2024-51324, to terminate security processes.

A custom loader initiated the vulnerable driver, located targeted endpoint detection services then issued kernel-level commands to kill them. After this, a PowerShell script escalated privileges, shut down security and backup services, and erased all shadow copies to remove recovery paths.

The actor also deployed several reconnaissance and lateral movement commands, enabling remote access through Remote Desktop Protocol (RDP) connections and a stealthy AnyDesk installation.

Read more on RATs: How Forgotten Remote Access Tools Are Putting Organizations at Risk 

According to Talos, the DeadLock payload was compiled in July 2025 and written in C++. Once executed, it dropped an embedded batch script to set up the environment, then injected itself into rundll32.exe via process hollowing.

Its configuration data stretched 8888 bytes and outlined timing parameters, exclusion lists, service and process kill lists, and a ransom note.

Notably, the ransomware used a custom stream cipher to encrypt files. It generated time-based keys, processed file contents in memory and appended “.dlock” to encrypted files. Additionally, it waited roughly 50 seconds to evade sandbox detection before launching encryption.

System Impact and Security Advice

The DeadLock infection targeted a broad range of applications and services, including databases, backup software and endpoint protection suites. At the same time, it avoided core Windows directories and critical system files so the machine would remain functional for ransom negotiations.

Talos found that the ransomware also replaced icons for encrypted files, altered wallpaper and disabled command-line tools.

“The ransom note also describes the acceptance of ransom payment in Bitcoin or Monero and indicates warnings against file renaming or third-party decryption attempts,” wrote Talos.

Victims received a detailed ransom note promising “military-grade encryption,” outlining a six-step recovery process and offering payment via Bitcoin or Monero. Communication occurred exclusively through Session Messenger.

“Session [was] their primary communication platform, leveraging its end-to-end encryption [E2EE] and anonymity features to evade law enforcement surveillance while maintaining victim contact through the session ID,” Cisco Talos explained.

To defend against similar threats, security experts recommend maintaining strong endpoint protection, enforcing multi-factor authentication (MFA) and keeping regular offline backups.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMalicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools
Next Article GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools
Team-CWD
  • Website

Related Posts

News

Substack Confirms Data Breach, “Limited User Data” Compromised

February 6, 2026
News

SmarterMail Fixes Critical Unauthenticated RCE Flaw with CVSS 9.3 Score

February 6, 2026
News

Chinese-Made Malware Kit Targets Chinese-Based Edge Devices

February 6, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Watch out for SVG files booby-trapped with malware

September 22, 2025

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Your information is on the dark web. What happens next?

January 13, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.