Malware Mayhem: Cybercriminals Hijack Avast Driver to Wreak Havoc!
Cybersecurity researchers have discovered a new BYOVD attack using a legitimate Avast driver to disarm security protections. This sneaky malware terminates 142 processes, including security software, by exploiting the driver’s kernel-level access. It’s like hiring a bodyguard who secretly moonlights as a ninja for the other team.

Hot Take:
Who knew that the infamous “bring your own” trend would extend to the world of cybersecurity villains? Forget about bringing your own beer to a party; these cybercriminals are bringing their own vulnerable drivers to crash the security bash!
Key Points:
- New malicious campaign uses BYOVD to disable security measures.
- Malware drops a legitimate Avast Anti-Rootkit driver and manipulates it.
- Malware gains kernel-level access, terminating 142 processes, including security software.
- Exact initial access vector remains unclear, as does the scope of the attack.
- BYOVD attacks have become a common method for deploying ransomware.
Already a member? Log in here
