<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic BYOVD Attacks in Threats</title>
    <link>https://community.isc2.org/t5/Threats/BYOVD-Attacks/m-p/83890#M1713</link>
    <description>&lt;P&gt;Ransomware group is weaponizing a legitimate but vulnerable driver to disable or kill security process (AV / EDR) on victim machines.&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;This is accomplished through what's known as a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A href="https://www.darkreading.com/vulnerabilities-threats/gentlemen-ransomware-vulnerable-driver-security-gear" target="_blank" rel="noopener"&gt;bring-your-own-vulnerable-driver (BYOVD)&lt;/A&gt; attack&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;, in which threat actors use the driver's kernel-level access to manipulate and even terminate processes that would otherwise be protected.&lt;/SPAN&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Implement strict driver control policies, ensuring only trusted and patched drivers can be loaded. Continuously monitor for abnormal driver activity and privilege escalation attempts to quickly detect and block BYOVD attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Sep 2025 14:45:35 GMT</pubDate>
    <dc:creator>akkem</dc:creator>
    <dc:date>2025-09-12T14:45:35Z</dc:date>
    <item>
      <title>BYOVD Attacks</title>
      <link>https://community.isc2.org/t5/Threats/BYOVD-Attacks/m-p/83890#M1713</link>
      <description>&lt;P&gt;Ransomware group is weaponizing a legitimate but vulnerable driver to disable or kill security process (AV / EDR) on victim machines.&lt;/P&gt;&lt;P data-unlink="true"&gt;&lt;SPAN class=""&gt;This is accomplished through what's known as a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;A href="https://www.darkreading.com/vulnerabilities-threats/gentlemen-ransomware-vulnerable-driver-security-gear" target="_blank" rel="noopener"&gt;bring-your-own-vulnerable-driver (BYOVD)&lt;/A&gt; attack&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;, in which threat actors use the driver's kernel-level access to manipulate and even terminate processes that would otherwise be protected.&lt;/SPAN&gt;&lt;/P&gt;&lt;P data-unlink="true"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Implement strict driver control policies, ensuring only trusted and patched drivers can be loaded. Continuously monitor for abnormal driver activity and privilege escalation attempts to quickly detect and block BYOVD attacks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Sep 2025 14:45:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/BYOVD-Attacks/m-p/83890#M1713</guid>
      <dc:creator>akkem</dc:creator>
      <dc:date>2025-09-12T14:45:35Z</dc:date>
    </item>
  </channel>
</rss>

