Saturday, September 6, 2025
Cosmic Meta Shop
Cosmic Meta Shop
Cosmic Meta Shop
Cosmic Meta Shop
Ana SayfaMiscellaneousAkira ransomware abuses CPU tuning tool to disable Microsoft Defender

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender

Akira ransomware has adopted a novel evasion tactic: abusing a legitimate Intel CPU tuning driver to disable Microsoft Defender protections. This BYOVD technique enables attackers to bypass endpoint defenses, making effective detection and response more urgent than ever.

- Advertisement -
Cosmic Meta Spotify

Understanding the Evolving Defense Evasion Tactics of Akira Ransomware

Akira ransomware has emerged as one of the more formidable cyber threats since its identification in 2023. Most importantly, its operators have adopted an innovative approach by abusing legitimate tools in a process that enables them to disable critical security software such as Microsoft Defender. Because this method exploits a trusted Intel CPU tuning utility, the attackers can operate under the guise of normal system behavior, thereby delaying detection.

In addition, the integration of a Bring Your Own Vulnerable Driver (BYOVD) strategy has greatly augmented its success. This technique takes advantage of signed, yet vulnerable, drivers present in Windows systems. Therefore, the risk is compounded and makes traditional security measures less effective. Moreover, as detailed in various security analyses, this approach increases the window of opportunity for attackers to gain higher privileges and disable essential protections.

Stealthy Execution: How the Akira Ransomware Attack Unfolds

The attack begins when the malicious actors load and register the vulnerable driver, rwdrv.sys, which is typically associated with the Intel CPU tuning utility ThrottleStop. Because this driver is legitimate, its presence is often not flagged by the system. Therefore, attackers cleverly repurpose it to install an additional driver, hlpdrv.sys, that performs harmful modifications to Windows Defender settings. This stealthy execution enables the ransomware to bypass early detection methods.

Furthermore, once these drivers are active, the ransomware executes a series of commands that alter the system’s registry values, including modifying the DisableAntiSpyware keys. This manipulation undermines Windows Defender and other security protocols, paving the way for further ransomware activities. Besides that, the reliance on the BYOVD tactic means that conventional prevention measures might fall short, urging organizations to reassess their security postures.

Technical Analysis: The Mechanics Behind BYOVD

BYOVD stands for ‘Bring Your Own Vulnerable Driver’, a method that takes advantage of the fact that Windows trusts signed drivers even if they have known vulnerabilities. Because companies certify these drivers, attackers can use them to escape the scrutiny of usual security checks. Most importantly, rather than injecting entirely new malicious code, the adversaries repurpose genuine drivers and overlay harmful functionality.

Additionally, by leveraging rwdrv.sys as an entry point, Akira ransomware introduces hlpdrv.sys to gain kernel-level access. This clever orchestration means the threat operators not only bypass antivirus and Endpoint Detection and Response (EDR) solutions but also disable underlying defense measures that protect critical system components. Therefore, the BYOVD method is particularly dangerous as it minimizes alert triggers during the initial phases of the attack. For further in-depth information, see the analysis by BleepingComputer and GBHackers.

- Advertisement -
Cosmic Meta Shop
Casey Blake
Casey Blakehttps://cosmicmeta.ai
Cosmic Meta Digital is your ultimate destination for the latest tech news, in-depth reviews, and expert analyses. Our mission is to keep you informed and ahead of the curve in the rapidly evolving world of technology, covering everything from programming best practices to emerging tech trends. Join us as we explore and demystify the digital age.
RELATED ARTICLES

CEVAP VER

Lütfen yorumunuzu giriniz!
Lütfen isminizi buraya giriniz

- Advertisment -
Cosmic Meta NFT

Most Popular

Recent Comments