Ransomware Rumble: DeadLock’s Sneaky Security Sabotage Unveiled
DeadLock ransomware’s new tricks are no laughing matter. Cybersecurity researchers report mischief with a custom encryption routine, the BYOVD technique, and a rogue driver flaw. It’s like a heist movie, minus the popcorn. For a happy ending, beef up your endpoint protection and don’t forget those offline backups!

Hot Take:
Looks like the DeadLock ransomware gang just won the “Worst Houseguest of the Year” award. They crash the party by bringing their own vulnerable driver, then proceed to rummage through your fridge (a.k.a. your endpoint detection tools), and leave a ransom note with more demands than a diva on a world tour. Honestly, can someone please tell them that BYOD stands for Bring Your Own Device, not Driver?
Key Points:
- DeadLock ransomware uses a sneaky BYOVD method to disable security systems.
- The attack exploits a vulnerability in Baidu Antivirus driver (CVE-2024-51324).
- Privilege escalation, registry modifications, and RATs are part of the attack package.
- Custom encryption with time-based keys and “.dlock” file extensions add to the chaos.
- Ransom demands are made via Bitcoin or Monero with communication through Session Messenger.
Already a member? Log in here
