Windows Security and BYOVD attacks
Windows Security the Critical Setting You Need to Enable to
stop BYOVD attacks
The Setting That Matters
First things first, let's make sure you've got this
essential setting turned on
Open Windows Security (just type it
in the Start bar)
Click on Device Security
Look for Core isolation
Ensure Memory Integrity is on
Scroll down to find Microsoft
vulnerable driver blocklist
Make sure it's turned on
Don't panic if it's grayed out as long as it's on and Memory Integrity is
enabled, you're good to go.
Why This Setting Is a Big Deal
Ransomware groups are getting sneaky, and one of their
favorite tricks is called Bring Your Own Vulnerable Driver (BYOVD). Here's how
it works
Attackers use a vulnerable driver
from a legitimate program (like a partition manager)
They drop this driver onto your
system
The driver, being signed by
Microsoft, is trusted by your system
They exploit the vulnerability to
gain elevated privileges
Game over – they can now bypass
your antivirus and encrypt your data
The Scary Part? You don't even need to use the vulnerable
program. Attackers can bring their own driver and wreak havoc.
Big Names, Big Problems
Some of the most notorious ransomware groups using this
technique include
Scattered Spider
Lazarus
Black Byte
LockBit
These groups have successfully attacked major companies with
topnotch security systems. How? Often through techniques like BYOVD.
System Privileges The Keys to the Kingdom
When attackers gain system privileges, they essentially have
full control over your computer. They can
Modify any folder contents
Bypass folder protection mechanisms
Disable security features with
simple PowerShell scripts
ZeroDay Vulnerabilities The Ultimate Threat
While the vulnerable driver blocklist is great for known
threats, it can't protect against zeroday vulnerabilities. These are unknown
flaws that attackers discover and exploit before anyone else knows about them.
Balancing Security and Performance
Some gamers might be tempted to disable memory integrity and
core isolation features for better performance. But here's a pro tip never
disable the blocklist if you want to stay secure.
Enabling the Microsoft Vulnerable Driver Blocklist is a
simple yet powerful step in protecting your system from sophisticated attacks.
It's not foolproof, especially against zeroday threats, but it significantly
raises the bar for potential attackers.
Remember, in the world of cybersecurity, every layer of
protection counts. So, take a minute now to check your settings and ensure
you're not leaving an open door for ransomware groups.
0 Comments