Shared from twixb · thehackernews.com

Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools

thehackernews.com·Apr 6, 2026

Threat actors linked to Qilin and Warlock ransomware are using the BYOVD technique to disable security tools on compromised systems, with Qilin attacks involving the deployment of a malicious DLL called "msimg32.dll," as reported by Cisco Talos and Trend Micro.

For a cybersecurity professional, a critical takeaway is the observed use of the BYOVD technique by Qilin and Warlock ransomware groups to disable security tools on compromised systems. This highlights the need for enhanced monitoring and controls around driver loading processes in your security operations, potentially integrating more robust detection mechanisms to identify and mitigate the deployment of malicious DLLs like "msimg32.dll."

Powered by twixb

Want more content like this?

twixb tracks your favorite blogs and social media, filters by keywords, and delivers personalized key learnings — straight to your inbox.