Threat actors are actively exploiting compromised SonicWall SSLVPN credentials to gain initial network access and deploy a sophisticated “EDR killer” payload that effectively blinds endpoint detection and response tools. The campaign, analyzed by Huntress, demonstrates a significant shift toward leveraging legitimate drivers to bypass security protections after VPN compromise. In early February 2026, attackers authenticated to a SonicWall SSLVPN using valid but stolen credentials, bypassing brute-force detection and multi-factor authentication safeguards. Once inside the target network environment, the threat actor conducted aggressive internal scanning triggering IPS alerts with ICMP sweeps and high-volume SYN flooding to map assets and security controls. The core malicious component involved a 64-bit Windows executable that drops a specially crafted kernel driver disguised as a firmware update (OemHwUpd.sys). Instead of traditional encryption, the malware embedded its driver payload using a wordlist substitution cipher, complicating signature-based detection. The dropped driver abuses a revoked Guidance Software (EnCase) forensic driver, exploiting weaknesses in Windows Driver Signature Enforcement (DSE). Although the certificate was revoked in 2010, legacy cryptographic validation allows the driver to load, granting kernel access. Using this foothold, the malware iteratively terminates dozens of security processes protected by Protected Process Light (PPL), including Microsoft Defender, CrowdStrike, SentinelOne, and Carbon Black.
Android users are being targeted in a large-scale malware operation designed to silently enroll victims into premium mobile billing services without consent. The campaign abuses ca...
U.S. and Canadian law enforcement agencies have detained an alleged operator connected to the KimWolf botnet, a cybercrime platform known for conducting large-scale DDoS attacks us...
A newly identified Phishing-as-a-Service (PhaaS) platform named Kali365 is actively targeting Microsoft 365 users by abusing OAuth device authentication flows to bypass multi-facto...