Qilin Ransomware Blinds Defenses with Advanced EDR Killer, Abusing Vulnerable Drivers

Qilin Ransomware Uses Sophisticated EDR Killer to Disable Over 300 Security Products

CRITICAL
April 21, 2026
6m read
RansomwareMalwareCyberattack

Related Entities

Threat Actors

Organizations

Other

Qilin Ransomware

Full Report

Executive Summary

The Qilin ransomware-as-a-service (RaaS) operation is deploying a highly advanced, multi-stage infection chain specifically designed to disable Endpoint Detection and Response (EDR) solutions. Research from Cisco Talos details how the attackers use a combination of DLL side-loading, in-memory execution, and the "bring your own vulnerable driver" (BYOVD) technique to systematically dismantle security defenses at the kernel level. The malware abuses a legitimately signed but vulnerable driver (rwdrv.sys) to gain read/write access to kernel memory, which it then uses to find and unregister the callbacks for over 300 different EDR drivers. This effectively renders the security tools blind and powerless, allowing the ransomware to execute unimpeded. This tactic represents a significant evolution in ransomware tradecraft, focusing on the complete neutralization of the security stack as a standard operational step.


Threat Overview

The attack demonstrates a deep understanding of Windows internals and EDR product architecture. The primary goal is defense evasion to ensure the successful execution of the final ransomware payload. The operation is notable for its stealth and sophistication, executing almost entirely in memory to avoid detection by traditional file-based antivirus.

The group, also known as Agenda, Gold Feather, or Water Galura, has a high operational tempo, claiming over 40 victims per month.

Technical Analysis

The attack chain is a masterclass in defense evasion.

Infection Chain:

  1. DLL Side-Loading: The attack begins when a legitimate, signed application (e.g., FoxitPDFReader.exe) is executed from a directory containing a malicious DLL named msimg32.dll. The legitimate application loads the malicious DLL instead of the real one from the system directory.
  2. In-Memory Execution: The malicious msimg32.dll acts as a loader. It forwards legitimate function calls to the real system DLL to maintain normal application behavior while initiating a four-stage, in-memory loading process for its final payload. This avoids writing malicious files to disk.
  3. Evasion Techniques: The loader employs advanced evasion techniques, including suppressing Event Tracing for Windows (ETW) to blind logging and using Structured Exception Handling (SEH) to obfuscate its own execution flow.
  4. Bring Your Own Vulnerable Driver (BYOVD): The final payload is the EDR killer. It drops and loads a legitimately signed but vulnerable driver, rwdrv.sys (a renamed version of ThrottleStop.sys). This driver is vulnerable to an issue that allows user-mode applications to gain arbitrary read/write access to kernel memory.
  5. Kernel-Level Manipulation: Using the access granted by rwdrv.sys, the malware scans kernel memory to locate the callback routines registered by EDR drivers. These callbacks are what allow EDR products to monitor events like process creation, thread creation, and image loading.
  6. Disabling EDR: The malware systematically unregisters or overwrites the pointers for these callbacks, effectively detaching the EDR product from the kernel. With its eyes and ears gone, the EDR is rendered useless.
  7. Ransomware Execution: With defenses disabled, the malware loads a second driver, hlpdrv.sys, to terminate the now-unprotected EDR processes and then proceeds to deploy the Qilin ransomware payload to encrypt the system.

MITRE ATT&CK TTPs:

Impact Assessment

The use of such a sophisticated EDR killer significantly increases the probability of a successful ransomware attack. Organizations that rely solely on their EDR solution for protection are left completely vulnerable. A successful Qilin attack leads to widespread data encryption, operational downtime, and financial losses from recovery efforts and potential ransom payments. The technical sophistication required to reverse-engineer and defeat this attack means that recovery can be complex and costly. This tactic effectively resets the balance of power between attackers and defenders, forcing security vendors to develop new methods of tamper protection for their kernel-level components.

IOCs — Directly from Articles

Type
File Name
Value
msimg32.dll
Description
Malicious loader DLL used in side-loading attack
Type
File Name
Value
rwdrv.sys
Description
Renamed, vulnerable, signed driver (ThrottleStop.sys) used for kernel access
Type
File Name
Value
hlpdrv.sys
Description
Second driver used to terminate EDR processes

Cyber Observables — Hunting Hints

Security teams should hunt for the following indicators of a Qilin attack:

Type
File Name
Value
rwdrv.sys or ThrottleStop.sys
Description
The presence of this driver, especially if recently created or loaded by an unusual process, is highly suspicious.
Context
EDR, Sysmon Event ID 6 (Driver Loaded).
Type
Process Name
Value
FoxitPDFReader.exe (or other legitimate apps)
Description
Look for legitimate applications spawning unusual child processes or making suspicious network connections.
Context
EDR process tree analysis.
Type
Registry Key
Value
HKLM\SYSTEM\CurrentControlSet\Services\rwdrv
Description
Creation of a new service to load the vulnerable driver.
Context
Registry monitoring, Sysmon Event ID 12/13.
Type
Log Source
Value
EDR/AV Logs
Description
Alerts indicating that the EDR/AV service has stopped unexpectedly or that tamper protection has been triggered.
Context
Security tool health monitoring.

Detection & Response

Detection:

  1. Driver Monitoring: Monitor for the loading of any new or non-standard drivers. Use a driver blocklist to prevent known vulnerable drivers like rwdrv.sys from being loaded.
  2. Tamper Protection: Ensure that the tamper protection features of your EDR solution are enabled and configured to the highest level.
  3. Behavioral Detections: While the EDR may be blinded, other security tools (network, identity) may still detect downstream activity. Look for a sudden loss of telemetry from an endpoint as a key indicator of compromise.

Response:

  1. Isolate: If an endpoint suddenly stops reporting to the EDR console, immediately isolate it from the network as a precaution.
  2. Preserve and Analyze: Do not simply re-image the machine. Preserve a forensic image to analyze how the EDR was bypassed. This is critical intelligence for improving defenses.

Mitigation

  1. Driver Block-listing: Use technologies like Windows Defender Application Control (WDAC) to create policies that block known vulnerable drivers from being loaded into the kernel.
  2. Attack Surface Reduction (ASR): Implement ASR rules to block legitimate applications from being abused in DLL side-loading attacks.
  3. Kernel-Level Security: Enable virtualization-based security features like Hypervisor-Protected Code Integrity (HVCI) which can make it more difficult for attackers to load malicious drivers or modify kernel memory.

Timeline of Events

1
April 21, 2026
This article was published

MITRE ATT&CK Mitigations

Use application control solutions like WDAC to block known vulnerable drivers from being loaded.

Mapped D3FEND Techniques:

Enable virtualization-based security (VBS) and Hypervisor-Protected Code Integrity (HVCI) to protect the kernel from manipulation.

Mapped D3FEND Techniques:

Ensure EDR tamper protection is enabled and monitor for alerts indicating the security service has been stopped or modified.

D3FEND Defensive Countermeasures

To directly counter the Qilin ransomware's BYOVD technique, organizations must implement robust driver load integrity checking. The most effective way to do this on Windows systems is through Windows Defender Application Control (WDAC) and Hypervisor-Protected Code Integrity (HVCI). A WDAC policy can be created to explicitly block known vulnerable drivers like rwdrv.sys (and its original ThrottleStop.sys) by hash or signing certificate. This prevents the driver from ever being loaded into the kernel, stopping the attack chain before it can gain kernel memory access. For a more advanced posture, HVCI uses virtualization-based security (VBS) to protect the kernel from modification, making it significantly harder for even a malicious driver to manipulate kernel structures like EDR callbacks. Implementing a strict WDAC policy that only allows known, good drivers to load is the ultimate defense against this entire class of attack.

For detecting the initial stages of the Qilin attack, detailed process analysis is key. Security teams should configure EDR and SIEM solutions to monitor for the specific behaviors of the DLL side-loading technique. Create detection rules that look for a legitimate, signed executable (like FoxitPDFReader.exe) loading a DLL (like msimg32.dll) from a non-standard path (e.g., the same directory as the executable, instead of System32). Further, analyze the process tree: is this legitimate application suddenly creating a new service, writing a .sys file to disk, or attempting to load a driver? This chain of events is highly anomalous and a strong indicator of compromise. Even if the EDR is later blinded, detecting this initial activity provides a crucial window for incident responders to isolate the host and prevent the final ransomware payload from executing.

Sources & References

Qilin EDR killer infection chain
Cisco Talos (talosintelligence.com) April 2, 2026
Qilin Ransomware Uses Malicious DLL to Kill Almost Every Vendor’s EDR Solutions
Cybersecurity News (cybersecuritynews.co.uk) April 2, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

QilinransomwareEDRBYOVDkerneldefense evasionCisco TalosDLL side-loading

📢 Share This Article

Help others stay informed about cybersecurity threats