Threat actors are deploying a sophisticated EDR-killer tool that abuses a decade-old, revoked kernel driver to systematically terminate endpoint security products before deploying ransomware. A report from security firm Huntress details an attack leveraging the Bring Your Own Vulnerable Driver (BYOVD) technique. The attackers introduce EnPortv.sys, a legitimate driver from Guidance Software's EnCase forensic toolkit, whose certificate was revoked in 2010. A loophole in Windows' driver signature validation still allows this driver to be loaded, granting the malware powerful kernel-level privileges. The tool then uses this access to forcefully terminate processes belonging to 59 different security products, effectively blinding the organization's defenses and paving the way for the final ransomware payload.
The attack represents a mature stage in the ransomware playbook, where disabling security controls is a standard preliminary step. The initial access vector in the observed incident was compromised credentials for a SonicWall SSL VPN, a common entry point. After gaining access, the attackers' primary goal was to neutralize the endpoint detection and response (EDR) solution to operate undetected.
EnPortv.sys. It is a component of the EnCase digital forensics software, originally developed by Guidance Software (now OpenText). While the driver's digital certificate expired in 2010 and was revoked, Windows Driver Signature Enforcement fails to block it, creating a dangerous loophole.EnPortv.sys driver and a list of 59 process names associated with major cybersecurity vendors, including:EnPortv.sys driver.The successful execution of this EDR killer has a critical impact on an organization's security posture.
D3FEND Techniques: Driver Load Integrity Checking (D3-DLIC), Process Analysis (D3-PA)
EnPortv.sys is a major red flag. Windows Event ID 7045 can indicate a new service (driver) being installed.D3FEND Techniques: Executable Denylisting (D3-EDL), Multi-factor Authentication (D3-MFA), Software Update (D3-SU)
Use application control policies, like Windows Defender Application Control (WDAC), to block known vulnerable drivers from being loaded.
Enable EDR anti-tampering features, which are designed to protect security processes from being terminated.
Enforce MFA on VPNs and other remote access points to prevent initial access via compromised credentials.
Keep VPN appliances and other edge devices fully patched to prevent them from being used as an entry point.
The most direct countermeasure to this specific BYOVD attack is to prevent the vulnerable driver, EnPortv.sys, from ever being loaded. This can be achieved through executable denylisting, specifically using a driver blocklist. Microsoft's Windows Defender Application Control (WDAC) and the 'vulnerable driver blocklist' feature can be configured to prevent specific drivers, identified by their hash or signing certificate details, from loading into the kernel. By adding EnPortv.sys and other known-abused drivers to this blocklist, organizations can neutralize the attacker's tool. This defense breaks the attack chain at a critical step, preventing the attacker from gaining the kernel-level privileges needed to disable security tools, even if they have already achieved initial access to the machine.
Strengthening the integrity checks for driver loading is a fundamental defense against BYOVD. This involves enabling and enforcing security features like Secure Boot and ensuring that Windows Driver Signature Enforcement is operating correctly. While the EnPortv.sys driver highlights a gap in this enforcement for revoked certificates, organizations should still ensure these foundational security settings are active. Furthermore, advanced endpoint security solutions can provide enhanced driver load monitoring. Security teams should configure their EDR and SIEM systems to generate high-priority alerts whenever a new, unsigned, or suspicious driver is loaded. The loading of a forensic driver like EnPortv.sys on a standard corporate endpoint or server is a highly anomalous event that should trigger an immediate investigation.
While not a direct defense against the BYOVD technique itself, robust MFA is crucial for preventing the initial access that allows such tools to be deployed. The attack described by Huntress began with compromised SonicWall SSL VPN credentials. Had phishing-resistant MFA been enforced on the VPN, this initial breach could have been prevented. Organizations must move beyond simple username/password authentication for all remote access points. Implementing MFA makes it significantly harder for attackers to leverage stolen or weak credentials, forcing them to use more complex and detectable methods. This defense-in-depth approach ensures that even if a new EDR-killer emerges, attackers will have a much harder time getting into a position to use it.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats