Threat actors are actively exploiting compromised SonicWall SSLVPN credentials to gain initial network access and deploy a sophisticated “EDR killer” payload that effectively blinds endpoint detection and response tools. The campaign, analyzed by Huntress, demonstrates a significant shift toward leveraging legitimate drivers to bypass security protections after VPN compromise. In early February 2026, attackers authenticated to a SonicWall SSLVPN using valid but stolen credentials, bypassing brute-force detection and multi-factor authentication safeguards. Once inside the target network environment, the threat actor conducted aggressive internal scanning triggering IPS alerts with ICMP sweeps and high-volume SYN flooding to map assets and security controls. The core malicious component involved a 64-bit Windows executable that drops a specially crafted kernel driver disguised as a firmware update (OemHwUpd.sys). Instead of traditional encryption, the malware embedded its driver payload using a wordlist substitution cipher, complicating signature-based detection. The dropped driver abuses a revoked Guidance Software (EnCase) forensic driver, exploiting weaknesses in Windows Driver Signature Enforcement (DSE). Although the certificate was revoked in 2010, legacy cryptographic validation allows the driver to load, granting kernel access. Using this foothold, the malware iteratively terminates dozens of security processes protected by Protected Process Light (PPL), including Microsoft Defender, CrowdStrike, SentinelOne, and Carbon Black.
Cybersecurity researchers have uncovered a sophisticated gateway-monitoring and adversary-in-the-middle (AitM) framework called DKnife, operated by China-linked threat actors since...
China-nexus threat actors have been observed conducting coordinated cyber-espionage operations targeting organizations across multiple sectors worldwide. These campaigns focus on l...
The Pakistan-linked advanced persistent threat (APT) group Transparent Tribe (also tracked as APT36) has shifted its focus from traditional government and defense targets to compro...