Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Shai-Hulud Worm Steals Developer Secrets from GitHub Kubernetes
May 15, 2026
Home/CyberSecurity News/Hackers Exploit SonicWall SSLVPN to Credentials Deploy
CyberSecurity News

Hackers Exploit SonicWall SSLVPN to Credentials Deploy

Threat actors are actively leveraging compromised SonicWall SSLVPN credentials to breach networks and deploy a sophisticated “EDR killer” that can blind endpoint security solutions. In a campaign...

Emy Elsamnoudy
Emy Elsamnoudy
February 5, 2026 3 Min Read
4 0

Threat actors are actively leveraging compromised SonicWall SSLVPN credentials to breach networks and deploy a sophisticated “EDR killer” that can blind endpoint security solutions.

In a campaign analyzed by Huntress in early February 2026, attackers utilized valid VPN accounts to gain initial access before executing a Bring Your Own Vulnerable Driver (BYOVD) attack using a revoked Guidance Software (EnCase) forensic driver.

This technique allows them to terminate critical security processes from the kernel level, effectively bypassing standard protections.

The intrusion began with the threat actor authenticating to a SonicWall SSLVPN using compromised but valid credentials, bypassing the need for brute-force attacks.

Huntress identified the successful login originating from the malicious IP address 69.10.60[.]250. Just one minute earlier, logs captured a failed portal login attempt from a different IP, 193.160.216[.] 221, where the account lacked sufficient privileges.

Once inside the network, the attacker immediately initiated aggressive reconnaissance. SonicWall IPS alerts recorded high-volume activity, including ICMP ping sweeps and NetBIOS probes.

The attacker also triggered SYN flood behavior, generating traffic exceeding 370 SYNs/second as they mapped the internal environment.

The EDR Killer Payload

The core of the attack involved a 64-bit Windows executable designed to deploy a malicious kernel driver. To evade static analysis, the malware authors implemented a custom encoding scheme that concealed the driver payload using a wordlist substitution cipher.

Instead of standard encryption, the binary used a 256-word dictionary where English words represented specific byte values, for instance, “about” decoding to 0x00 and “block” to 0x4D.

When executed, the malware decodes this “text” back into a valid Windows PE file and drops it to C:ProgramDataOEMFirmwareOemHwUpd.sys.

The malware then applies anti-forensic techniques, such as “timestomping,” by copying timestamps from the legitimate ntdll.dll to the malicious driver to blend in with system files. The payload registers itself as a kernel service named “OEM Hardware HAL Service” to ensure persistence across reboots.

The attack relies on a known gap in Windows Driver Signature Enforcement (DSE). The deployed driver is a legitimate component of Guidance Software’s EnCase forensic suite (EnPortv.sys), signed with a certificate that expired in 2010 and was subsequently revoked.

Despite the revocation, Windows loads the driver because the kernel primarily validates the cryptographic integrity of the signature rather than checking the Certificate Revocation List (CRL) during boot.

Because the driver was timestamped by a trusted authority before the certificate expired, it meets Microsoft’s legacy exception for drivers signed prior to July 29, 2015. This allows the attacker to load the driver successfully and expose an IOCTL interface (0x223078) to user-mode processes.

Once loaded into the kernel, the driver grants the attacker the ability to terminate processes protected by mechanisms like Protected Process Light (PPL). The malware targets a hardcoded list of 59 processes associated with major security vendors, including Microsoft Defender, CrowdStrike, SentinelOne, and Carbon Black.

The kill loop runs continuously with a one-second sleep interval to ensure that any restarting security services are immediately terminated again.

Type Value Description
File Path C:ProgramDataOEMFirmwareOemHwUpd.sys Location where the malicious driver is dropped​
Service Name OemHwUpd Kernel service created for persistence ​
Service Display Name OEM Hardware HAL Service Disguised service name to blend with legitimate tools​
IPv4 Address 69.10.60[.]250 Source IP for successful VPN authentication ​
IPv4 Address 193.160.216[.]221 Source IP for failed portal login attempt ​
SHA-256 3111f4d7d4fac55103453c4c8adb742def007b96b7c8ed265347df97137fbee0 Vulnerable EnCase forensic driver (OemHwUpd.sys) ​
SHA-256 6a6aaeed4a6bbe82a08d197f5d40c2592a461175f181e0440e0ff45d5fb60939 EDR killer binary masquerading as svchost.exe ​

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackBreachExploitHackerMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

DragonForce Ransomware Attacks Critical Business Data Exfiltration

Next Post

Fake Traffic Ticket Portals Steal Your PII & Credit

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OrBit Rootkit Steals SSH & Sudo Credentials from Hackers Harvest
May 15, 2026
Microsoft Warns: Attackers Use HPE Agent for Malware-
May 15, 2026
Tycoon 2FA Operators Use OAuth Phishing to Bypass Adopt Device
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us