Categories: Cyber Security News

Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware

A large-scale campaign is turning a trusted Windows security driver into a weapon that shuts down protection tools before ransomware and remote access malware are dropped.

The attacks abuse truesight.sys, a kernel driver from Adlice Software’s RogueKiller antivirus, and use more than 2,500 validly signed variants to quietly disable endpoint detection and response (EDR) and antivirus solutions across Windows systems.

The threat first gained wider attention when Check Point researchers exposed how attackers were abusing legacy driver signing rules to load pre-2015 signed drivers on modern Windows 11 machines.

Sponsored

By doing so, they could run the vulnerable TrueSight driver with full kernel privileges, even though Microsoft’s own security controls were meant to block risky drivers. The result is a reliable way to kill security tools before any payload is delivered.

Soon after this activity surfaced, MagicSword analysts noted that the driver abuse had already spread across multiple threat groups and regions, with fresh driver variants appearing week after week.

Their telemetry showed that financially motivated actors and advanced persistent threat (APT) groups were all adopting the same method to clear the way for ransomware and remote access trojans on compromised hosts.

At the center of this operation is the capability to terminate almost any security process on the system.

The vulnerable TrueSight 2.0.2 driver exposes an IOCTL command that accepts attacker-controlled input and can forcibly kill chosen processes, including protected EDR agents and antivirus engines.

Once the driver is loaded, the malware no longer has to fight user-mode tamper protections, because it operates directly in the Windows kernel with the same privileges as legitimate security software.

The impact is significant for defenders. With EDR agents shut down at the kernel level, telemetry stops, alerts never fire, and ransomware or remote access trojans can execute with almost no resistance.

Victims often only notice the attack when files are already encrypted or data has been quietly exfiltrated.

The scale of the driver variants and the high evasion rate against traditional antivirus make this technique especially dangerous for enterprises that rely on hash-based or signature-only defenses.

Infection Chain: From Phishing to Full Control

The infection chain behind these attacks follows a staged approach that uses common delivery methods but couples them with advanced driver abuse.

Sponsored

Initial access often starts with phishing emails, fake download sites, or compromised Telegram channels that lure users into running a disguised installer.

This first-stage executable acts as a downloader and fetches additional components from attacker-controlled servers, typically hosted on cloud infrastructure.

In the second stage, the malware sets up persistence through scheduled tasks and DLL side-loading, ensuring it survives reboots and blends in with normal system activity.

It then deploys an EDR killer module that is heavily obfuscated with VMProtect to hinder reverse engineering.

MagicSword researchers identified that this module targets nearly 200 different security products, ranging from CrowdStrike and SentinelOne to Kaspersky, Symantec, and many others, making the campaign effective across diverse enterprise environments.

When ready, the module downloads the TrueSight driver if it is not already present, installs it as a Windows service (commonly named TCLService), and sends the crafted IOCTL request to terminate running security processes.

With defenses gone, the final payload—often a HiddenGh0st remote access trojan or a ransomware family—runs with almost no visibility.

From the initial phishing click to full system control, this sequence can complete in as little as 30 minutes, leaving a very small window for detection and response.

Follow us on Google NewsLinkedIn, and X to Get More Instant UpdatesSet CSN as a Preferred Source in Google.

The post Hackers Weaponized 2,500+ Security Tools to Terminate Endpoint Protection Before Deploying Ransomware appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Dimiterscu Wine, Tofu, and 26 More Brilliant Little Resident Evil Requiem Details

This article contains spoilers for Resident Evil Requiem. Resident Evil Requiem finally sees the series…

13 minutes ago

Marathon Review So Far

From ARC Raiders to Escape From Duckov, extraction shooters seem to be enjoying something of…

14 minutes ago

Pokémon Winds and Waves Region Is Indeed Based on Southeast Asia, Filipinos Can Confirm

It's a very exciting time for the Pokémon community with the reveal of the 10th…

14 minutes ago

Education Department data shows foreign contracts, gifts to US colleges topped $5B in 2025

People walk past blooming trees on the Harvard University campus in Cambridge, Massachusetts, in April…

19 minutes ago

NASA is pushing back its plans for a Moon landing

NASA announced at a press conference on Friday that it's delaying its plans for a…

49 minutes ago

Defense secretary Pete Hegseth designates Anthropic a supply chain risk

US President Donald Trump (R) looks on as US Secretary of Defense Pete Hegseth speaks…

49 minutes ago

This website uses cookies.