美杜莎勒索软件利用恶意驱动程序禁用安全工具
Medusa 勒索软件利用来自中国供应商的恶意驱动 smuol.sys 禁用安全工具。该驱动伪装成 CrowdStrike Falcon 驱动,使用被吊销的证书并受 VMProtect 保护。Elastic 安全实验室发现该驱动可执行多种恶意操作以禁用安全工具。 2025-3-24 11:42:19 Author: www.securityweek.com(查看原文) 阅读量:4 收藏

The Medusa ransomware deploys a malicious driver from a Chinese vendor and uses it to disable the security tools running on the infected systems, cybersecurity firm Elastic Security Labs reports.

Named smuol.sys, the driver masquerades as a legitimate CrowdStrike Falcon driver, is signed with a revoked certificate from a Chinese company, and is protected using VMProtect.

Elastic, which named the driver AbyssWorker, has identified dozens of samples dated August 2024 to February 2025, all signed, likely using stolen certificates.

“These certificates are widely known and shared across different malware samples and campaigns but are not specific to this driver,” Elastic notes.

The driver itself, the cybersecurity firm notes, is not exclusive to Medusa ransomware, and was previously observed being used under the name of nbwdv.sys in social engineering attacks leading to backdoor infections.

The driver was signed with an expired certificate and, to ensure that the driver would run successfully, the attackers used a .bat file to disable the Windows Time Service and set the system date to 2012. A controller binary was used to communicate with the driver.

Elastic’s analysis of AbyssWorker revealed that the driver sets up a protection feature during initialization, by searching for and stripping any handles to its client process in other processes.

Once up and running, the driver can perform requests for a broad range of operations, including process manipulation, file manipulation, process tampering, API loading, hook removal, driver termination, and system reboot, which enables it to terminate and permanently disable security tools.

Advertisement. Scroll to continue reading.

AbyssWorker, Elastic explains, contains various handlers that rely on kernel APIs to perform malicious operations. The cybersecurity firm has created an implementation example that can load the driver’s APIs.

Related: Medusa Ransomware Made 300 Critical Infrastructure Victims

Related: Medusa Ransomware Attacks Increase

Related: Vulnerable Paragon Driver Exploited in Ransomware Attacks

Related: Dozens of Kernel Drivers Allow Attackers to Alter Firmware, Escalate Privileges


文章来源: https://www.securityweek.com/medusa-ransomware-uses-malicious-driver-to-disable-security-tools/
如有侵权请联系:admin#unsafe.sh