In February 2026, Reynolds ransomware did something that changed the game for endpoint security: it bundled a vulnerable kernel driver directly inside the ransomware payload itself. No separate EDR killer tool. No additional deployment step. The moment the ransomware executed, it loaded a signed NsecSoft NSecKrnl driver (CVE-2025-68947), used it to terminate processes for CrowdStrike Falcon, Palo Alto Cortex XDR, Sophos, Symantec, and Avast — then encrypted everything. Total time from execution to EDR blindness: seconds.
This wasn't an isolated innovation. It's the culmination of a trend that has been accelerating for over two years. EDR killers — purpose-built tools designed to neutralize endpoint security before the actual attack begins — have gone from advanced threat actor tradecraft to commoditized, affiliate-friendly tooling available across the ransomware ecosystem.
The numbers tell the story. A single BYOVD (Bring Your Own Vulnerable Driver) campaign using the TrueSight driver deployed over 2,500 driver variants between mid-2024 and early 2025. EDRKillShifter, originally developed for RansomHub, has been adopted by Play, BianLian, and Medusa ransomware operations. In August 2025, a custom EDR killer binary was identified in use by at least eight ransomware gangs simultaneously — Blacksuit, RansomHug, Medusa, Qilin, Dragonforce, Crytox, Lynx, and INC. A Huntress investigation in February 2026 found attackers using compromised SonicWall VPN credentials and then deploying an EDR killer that abused a revoked EnCase forensic driver — which Windows still allowed to load despite its expired certificate.
The CrowdStrike 2026 Global Threat Report confirms that 82% of detections are now malware-free. When the 18% that does involve malware arrives, it increasingly comes equipped to kill your detection stack first.
If your security strategy depends on EDR as the final line of defense, you have a single point of failure. And ransomware operators know exactly how to exploit it.
How EDR Killers Work: A Field Guide for Defenders
Understanding the mechanics helps explain why these attacks are so effective — and why traditional countermeasures keep falling short.
BYOVD: The Dominant Technique
The most prevalent EDR killer method is Bring Your Own Vulnerable Driver. The attacker drops a legitimate, digitally signed Windows kernel driver that contains a known vulnerability. Because the driver carries a valid digital signature, Windows allows it to load with kernel-level privileges. The attacker then exploits the vulnerability in the driver to terminate EDR processes, unregister kernel callbacks, or suppress telemetry.
This is devastatingly effective because it turns the operating system's trust model against the defender. Windows trusts the signed driver. The driver runs in kernel mode. From kernel mode, it can kill any process on the system — including your EDR agent. Symantec and Carbon Black researchers noted that Reynolds ransomware bundles the defense evasion component directly with the ransomware payload, eliminating the traditional detection window that defenders relied on when EDR killers were deployed as separate tools.
The list of vulnerable drivers being abused reads like a who's who of legitimate software: RTCore64.sys (MSI Afterburner), TrueSight.sys, PROCEXP.SYS (Process Explorer), aswArPot.sys (Avast anti-rootkit), the EnCase forensic driver, NSecKrnl.sys (NsecSoft), IMFForceDelete.sys (IObit Malware Fighter), BdApiUtil.sys (Baidu Antivirus), and GameDriverx64.sys (anti-cheat driver). Each one is signed, legitimate, and trusted by Windows — yet each contains vulnerabilities that attackers exploit to gain kernel access.
EDR Killer Tooling Goes Mainstream
What was once the province of sophisticated APT groups has become commoditized. EDRKillShifter uses BYOVD to terminate endpoint security processes and has been shared across competing ransomware operations. The Terminator tool and its variants abuse Zemana drivers. AuKill exploits the Process Explorer driver. The Singapore CSA issued an advisory specifically about a shared EDR killer framework that uses HeartCrypt packing, random driver name generation, and stolen code-signing certificates — a collaborative development model where multiple ransomware groups share and improve the same tool.
The VEN0m ransomware project, openly published on GitHub in February 2026 and tested against Windows 11 Pro 24H2, demonstrates how accessible this capability has become. It exploits CVE-2025-26125 in an IObit driver that is still not on Microsoft's blocklist as of the test date. The barrier to entry has never been lower.
Beyond BYOVD: The Expanding Arsenal
BYOVD isn't the only technique. EDR Silencer blocks EDR network traffic using the Windows Filtering Platform. Direct and indirect syscall techniques bypass user-mode API hooks entirely. On Linux, the RingReaper agent exploits the io_uring kernel interface to perform operations invisible to traditional Linux EDR syscall monitoring. When Akira ransomware's payload was quarantined by EDR on a Windows endpoint, the attackers simply pivoted to an unmonitored Linux-based webcam on the same network and encrypted from there.
The message is clear: EDR evasion is no longer a specialized skill. It's a standard feature in the modern ransomware toolkit, and the techniques are evolving faster than vendor mitigations can keep up.
Why Deception Survives When EDR Dies
Here's the critical insight: EDR killers target a specific class of security tool — endpoint agents that run as processes on the operating system. They kill processes. They unregister callbacks. They suppress telemetry. They operate entirely within the endpoint's operating system.
Honeytokens and deception technology operate on a completely different plane. They don't depend on endpoint agents. They don't run as processes that can be terminated. They don't rely on kernel callbacks that can be unregistered. A honeytoken is a piece of data — a fake credential, a decoy document, a bogus API key — planted in your environment. It has no agent. No process. No driver. There is nothing for an EDR killer to kill.
When an attacker deploys Reynolds ransomware and the BYOVD driver terminates CrowdStrike, Sophos, and Cortex XDR in the first seconds of execution, every honeytoken in the environment remains fully operational. Every decoy service continues listening. Every fake credential continues waiting. The detection layer that doesn't live on the endpoint is the detection layer that survives.
Honeytokens Detect What Happens Before EDR Gets Killed
EDR killers are deployed mid-to-late in the intrusion chain — after initial access, after credential theft, after lateral movement. The attacker needs privileged access to deploy a kernel driver. That means there's an entire attack sequence that precedes the EDR kill: phishing, credential harvesting, privilege escalation, network reconnaissance, lateral movement.
Mine2 honeytokens fire during these earlier phases. Credential honeytokens planted in browser stores, config files, and documentation catch the initial credential harvesting. MineField decoy services catch the network reconnaissance. Active Directory decoy accounts catch the privilege escalation probing. By the time the attacker is ready to deploy the EDR killer, the honeytokens have already triggered — giving your team the alert they need to contain the intrusion before the kill shot lands.
MineField Decoy Services Operate at the Network Layer
Mine2's MineField deploys decoy TCP services across your network. These aren't endpoint processes — they're network-level tripwires that detect scanning, lateral movement, and service enumeration. An EDR killer that terminates processes on a compromised endpoint has zero effect on MineField decoys running elsewhere on the network. When the attacker pivots from the blinded endpoint to the next target, MineField catches the movement.
Cloud Mines Exist Outside the Endpoint Entirely
Mine2's Cloud Mines — fake AWS resources, phantom S3 buckets, honeytoken IAM credentials — live in your cloud environment, not on any endpoint. They detect cloud credential abuse, resource enumeration, and cross-environment pivots. No BYOVD driver, no matter how privileged, can affect cloud-based deception assets. When ransomware operators shift from on-prem targets to cloud storage (a trend Symantec researchers highlighted with attacks on misconfigured S3 buckets), Cloud Mines are the detection layer that's already in position.
Fortify Hardens What EDR Killers Exploit
Mine2's Fortify addresses the root cause of BYOVD success: weak driver governance, unnecessary privileges, and exposed attack surfaces. Fortify identifies misconfigurations that enable EDR killers — unsigned driver loading allowed, outdated vulnerable drivers present, service accounts with unnecessary kernel access — and provides remediation guidance to close these gaps before attackers exploit them.
Practical Playbook: Surviving the EDR Killer Era
1. Layer Deception Behind Your EDR
Don't wait for EDR to fail before deploying detection alternatives. Plant honeytokens now — credential honeytokens in the locations attackers harvest (browser stores, config files, environment variables), MineField decoys on critical network segments, and Cloud Mines in your cloud environments. When EDR is working, honeytokens provide additional detection coverage. When EDR is killed, honeytokens become your primary detection layer.
2. Focus Honeytokens on the Pre-Kill Chain Phases
EDR killers deploy after the attacker has already gained privileged access. That means credential theft, lateral movement, and privilege escalation have already occurred. Deploy honeytokens specifically targeting these earlier phases: decoy domain admin credentials in LSASS-accessible locations, fake service accounts in Active Directory, and honeytoken API keys in code repositories. Catch the attacker during the phases that precede EDR termination.
3. Deploy MineField on Segments Your EDR Agents Protect
Place decoy services on the same network segments where your endpoints run EDR agents. When an attacker kills EDR on a compromised host and begins lateral movement to the next target, MineField catches the scan. The blinded endpoint can't see the movement — but the network-level deception layer can.
4. Harden Driver Governance with Fortify
Use Fortify to enforce driver blocklists, enable HVCI (Hypervisor-Protected Code Integrity) where possible, restrict driver loading to signed and known-good drivers, and monitor for suspicious .sys file creation in user-writable directories. Reducing the BYOVD attack surface makes the EDR kill harder to execute in the first place.
5. Monitor for EDR Silence as a Deception-Validated Signal
Configure your SIEM to alert on EDR agent silence — when an endpoint stops sending telemetry. Correlate EDR silence with honeytoken alerts: if an endpoint goes quiet at the same time a honeytoken fires on the same network segment, you have high-confidence evidence of an active intrusion with EDR-kill capabilities. This correlation transforms the absence of EDR signal from a monitoring gap into an actionable indicator.
6. Test Your Deception Layer Against EDR Kill Scenarios
Run tabletop exercises and purple team drills that simulate EDR termination. Disable EDR agents on test endpoints and verify that honeytoken and MineField alerts still fire when the simulated attacker performs post-compromise activities. Prove that your deception layer functions independently of your endpoint security stack.
The Bottom Line
The EDR killer era is here. BYOVD is no longer an advanced technique — it's embedded directly in ransomware payloads, shared across competing affiliate programs, and available to anyone with a GitHub account. When a signed kernel driver can terminate CrowdStrike, Sophos, Cortex XDR, and Symantec in a matter of seconds, any security strategy that depends solely on endpoint agents has a single point of failure.
Deception technology doesn't have this vulnerability. Honeytokens aren't processes that can be terminated. MineField decoys aren't kernel callbacks that can be unregistered. Cloud Mines don't run on endpoints that can be wiped. They exist as data and network-level tripwires that operate completely independently of your endpoint security stack.
When Reynolds ransomware kills your EDR, your honeytokens are still watching. When EDRKillShifter terminates your endpoint agent, your MineField decoys are still listening. When a BYOVD driver blinds every endpoint in the domain, your Cloud Mines are still detecting.
In a world where attackers now routinely kill the security tools designed to detect them, the detection layer that survives is the one with nothing to kill.
Don't let EDR killers blind your entire security stack. Deploy Mine2's deception layer — the detection that survives when EDR doesn't →
mine2 team
The MINE2 team consists of cybersecurity experts, researchers, and engineers dedicated to advancing threat detection and cyber deception technologies.
Recent Articles
Need Security Help?
Protect your organization with MINE2's cyber deception platform.
