Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Azure AD Conditional Access Bypass: Phantom Device PR
May 6, 2026
Critical Palo Alto Firewall Vulnerability Exploited for Root Access
May 6, 2026
Optimize SOC Costs & Boost Confidence with Better Threat Intelligence
May 5, 2026
Home/Threats/Hackers Use Windows Tools to Disable Antivirus for Ransom
Threats

Hackers Use Windows Tools to Disable Antivirus for Ransom

Ransomware operations have matured far beyond basic malicious code. Today, threat actors employ sophisticated tactics, utilizing legitimate Windows tools to systematically disable security defenses...

Jennifer sherman
Jennifer sherman
March 31, 2026 3 Min Read
0 0

Ransomware operations have matured far beyond basic malicious code. Today, threat actors employ sophisticated tactics, utilizing legitimate Windows tools to systematically disable security defenses before launching ransomware attacks, as detailed in <a href="https://ppl-ai-file-upload.s3.amazonaws.com/web/direct-files/attachments/11146061/c

This shift has made modern ransomware campaigns harder to detect and significantly more damaging.

The tools at the center of this threat were never designed for crime. Utilities such as Process Hacker, IOBit Unlocker, PowerRun, and AuKill were originally built to help IT teams manage processes, unlock files, and troubleshoot everyday system issues.

Attackers have repurposed them to silently terminate antivirus and endpoint detection and response (EDR) software before dropping a ransomware payload.

Since these tools are digitally signed and widely used in enterprise environments, most security systems treat their activity as standard administrative work — leaving very little trace behind.

Seqrite researchers identified this growing pattern and noted that the abuse of legitimate low-level tools has become a defining feature of today’s ransomware campaigns — from LockBit 3.0 and BlackCat to Dharma, Phobos, and MedusaLocker.

The research reveals that these threat actors do not rely on custom malware alone. Instead, they carefully study their targets, identify security weaknesses, and weaponize the very tools built to maintain system health.

Disabling antivirus is not a secondary step in these attacks — it is a deliberate and critical part of the overall plan. When security software is active, it can block malicious payloads at execution, capture abnormal encryption behavior, and alert security teams in real time.

By shutting down these defenses first, attackers create a silent window where ransomware can run freely and without interruption.

This strategy has advanced considerably over the years, moving from basic command-line scripts used by early threats like CryptoLocker and WannaCry, to kernel-level driver manipulation seen in Conti and LockBit 2.0 campaigns, and now to prepackaged antivirus killer modules embedded directly into ransomware-as-a-service (RaaS) kits.

The scope of this threat reaches organizations of all sizes — from small businesses to large enterprises — and the attack path consistently follows a deliberate sequence that exploits trusted tools at every stage to avoid detection.

The Two-Stage Abuse of Legitimate Windows Tools

Once attackers establish a foothold, they follow a two-stage process that systematically dismantles security before the ransomware payload ever runs.

In the first stage, the objective is entirely antivirus neutralization and privilege escalation. Tools like IOBit Unlocker delete antivirus binaries using the NtUnlockFile API, while TDSSKiller — originally a rootkit removal utility — is repurposed to unload antivirus kernel drivers, preventing them from reloading.

Process Hacker terminates antivirus processes by exploiting SeDebugPrivilege, and Atool_ExperModel deletes antivirus startup registry entries, removing scheduled tasks and breaking persistence altogether.

The second stage is where the attack reaches its most dangerous point. Once security software has been neutralized, attackers shift focus to credential theft, kernel manipulation, and ransomware deployment.

YDArk hooks kernel-level callbacks to maintain stealth persistence, while PowerRun executes the ransomware payload at full SYSTEM-level privileges.

Mimikatz reads LSASS memory to extract cached administrator credentials, enabling lateral movement across the network.

Unlock_IT erases registry entries and forensic traces to clean up evidence, while AuKill explicitly terminates all remaining EDR processes.

With both stages complete, the environment is fully prepared for silent, large-scale file encryption with no defenses left to intervene.

Organizations should enforce multi-factor authentication on all privileged accounts, enable application whitelisting to block unapproved utilities, and actively monitor for suspicious termination commands such as sc stop, net stop, and taskkill.

Security teams should audit registry changes tied to antivirus and startup configurations, limit access to low-level administrative tools to vetted personnel only, and train SOC analysts to recognize early signs of defense neutralization.

Any affected endpoint should be isolated immediately to prevent lateral movement and contain the impact

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitHackerMalwareransomwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Google Drive Gets Ransomware Detection & File Restoration

Next Post

Google Now Lets You Change Your @gmail. Allows Address

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Weaver E-cology RCE Actively Exploited Vulnerability Attacks
May 5, 2026
Cisco Acquires Astrix Security to Boost Strengthen Agent
May 5, 2026
China-Aligned SHADOW-EARTH-053 Exploits Exchange Servers to Deploy
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us