The Qilin ransomware-as-a-service (RaaS) operation is deploying a highly advanced, multi-stage infection chain specifically designed to disable Endpoint Detection and Response (EDR) solutions. Research from Cisco Talos details how the attackers use a combination of DLL side-loading, in-memory execution, and the "bring your own vulnerable driver" (BYOVD) technique to systematically dismantle security defenses at the kernel level. The malware abuses a legitimately signed but vulnerable driver (rwdrv.sys) to gain read/write access to kernel memory, which it then uses to find and unregister the callbacks for over 300 different EDR drivers. This effectively renders the security tools blind and powerless, allowing the ransomware to execute unimpeded. This tactic represents a significant evolution in ransomware tradecraft, focusing on the complete neutralization of the security stack as a standard operational step.
The attack demonstrates a deep understanding of Windows internals and EDR product architecture. The primary goal is defense evasion to ensure the successful execution of the final ransomware payload. The operation is notable for its stealth and sophistication, executing almost entirely in memory to avoid detection by traditional file-based antivirus.
The group, also known as Agenda, Gold Feather, or Water Galura, has a high operational tempo, claiming over 40 victims per month.
The attack chain is a masterclass in defense evasion.
Infection Chain:
FoxitPDFReader.exe) is executed from a directory containing a malicious DLL named msimg32.dll. The legitimate application loads the malicious DLL instead of the real one from the system directory.msimg32.dll acts as a loader. It forwards legitimate function calls to the real system DLL to maintain normal application behavior while initiating a four-stage, in-memory loading process for its final payload. This avoids writing malicious files to disk.rwdrv.sys (a renamed version of ThrottleStop.sys). This driver is vulnerable to an issue that allows user-mode applications to gain arbitrary read/write access to kernel memory.rwdrv.sys, the malware scans kernel memory to locate the callback routines registered by EDR drivers. These callbacks are what allow EDR products to monitor events like process creation, thread creation, and image loading.hlpdrv.sys, to terminate the now-unprotected EDR processes and then proceeds to deploy the Qilin ransomware payload to encrypt the system.MITRE ATT&CK TTPs:
T1562.001 - Disable or Modify Tools: The primary goal of the EDR killer payload.T1574.002 - DLL Side-Loading: The initial execution vector.T1055.001 - Dynamic-link Library Injection: The malware uses a multi-stage loader process in memory.T1068 - Exploitation for Privilege Escalation: The BYOVD technique is used to escalate privileges from user-mode to kernel-mode.T1486 - Data Encrypted for Impact: The final objective of the Qilin ransomware.The use of such a sophisticated EDR killer significantly increases the probability of a successful ransomware attack. Organizations that rely solely on their EDR solution for protection are left completely vulnerable. A successful Qilin attack leads to widespread data encryption, operational downtime, and financial losses from recovery efforts and potential ransom payments. The technical sophistication required to reverse-engineer and defeat this attack means that recovery can be complex and costly. This tactic effectively resets the balance of power between attackers and defenders, forcing security vendors to develop new methods of tamper protection for their kernel-level components.
msimg32.dllrwdrv.syshlpdrv.sysSecurity teams should hunt for the following indicators of a Qilin attack:
rwdrv.sys or ThrottleStop.sysFoxitPDFReader.exe (or other legitimate apps)HKLM\SYSTEM\CurrentControlSet\Services\rwdrvDetection:
rwdrv.sys from being loaded.Response:
Use application control solutions like WDAC to block known vulnerable drivers from being loaded.
Enable virtualization-based security (VBS) and Hypervisor-Protected Code Integrity (HVCI) to protect the kernel from manipulation.
To directly counter the Qilin ransomware's BYOVD technique, organizations must implement robust driver load integrity checking. The most effective way to do this on Windows systems is through Windows Defender Application Control (WDAC) and Hypervisor-Protected Code Integrity (HVCI). A WDAC policy can be created to explicitly block known vulnerable drivers like rwdrv.sys (and its original ThrottleStop.sys) by hash or signing certificate. This prevents the driver from ever being loaded into the kernel, stopping the attack chain before it can gain kernel memory access. For a more advanced posture, HVCI uses virtualization-based security (VBS) to protect the kernel from modification, making it significantly harder for even a malicious driver to manipulate kernel structures like EDR callbacks. Implementing a strict WDAC policy that only allows known, good drivers to load is the ultimate defense against this entire class of attack.
For detecting the initial stages of the Qilin attack, detailed process analysis is key. Security teams should configure EDR and SIEM solutions to monitor for the specific behaviors of the DLL side-loading technique. Create detection rules that look for a legitimate, signed executable (like FoxitPDFReader.exe) loading a DLL (like msimg32.dll) from a non-standard path (e.g., the same directory as the executable, instead of System32). Further, analyze the process tree: is this legitimate application suddenly creating a new service, writing a .sys file to disk, or attempting to load a driver? This chain of events is highly anomalous and a strong indicator of compromise. Even if the EDR is later blinded, detecting this initial activity provides a crucial window for incident responders to isolate the host and prevent the final ransomware payload from executing.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats