Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
May 8, 2026
Dirty Frag Linux Vulnerability Allows Root Privileges Access
May 8, 2026
Next.js & React Server Components: Critical Vulnerabilities Pat
May 8, 2026
Home/CyberSecurity News/Qilin Ransomware Evades EDR Solutions with Mal Uses Malicious
CyberSecurity News

Qilin Ransomware Evades EDR Solutions with Mal Uses Malicious

The Qilin ransomware group is deploying a sophisticated, multi-stage infection chain that effectively bypasses many endpoint detection and response (EDR) solutions. This complex attack leverages a...

Jennifer sherman
Jennifer sherman
April 2, 2026 3 Min Read
5 0

The Qilin ransomware group is deploying a sophisticated, multi-stage infection chain that effectively bypasses many endpoint detection and response (EDR) solutions. This complex attack leverages a malicious msimg32.dll to disable over 300 EDR drivers from virtually every major security vendor.

As organizations increasingly rely on EDR solutions, which offer far greater behavioral visibility than legacy antivirus, threat actors have adapted by weaponizing EDR killers as a core component of their attack chain.

By disabling telemetry collection across process creation, memory activity, and network behavior, attackers can operate undetected long enough to deploy their ransomware payload.

Qilin, also tracked as Agenda, Gold Feather, and Water Galura, has claimed over 40 victims per month and is considered one of the most active ransomware-as-a-service (RaaS) operations.

DLL Sideloading as the Entry Point

Cisco Talos researchers uncovered that the attack begins when a legitimate application, such as FoxitPDFReader.exe, sideloads the malicious msimg32.dll in place of the genuine Windows library.

To avoid immediate suspicion, the rogue DLL forwards all expected API calls to the real C:WindowsSystem32msimg32.dll, preserving normal application behavior while triggering its malicious logic directly from the DllMain function.

Embedded within the DLL is an encrypted EDR killer payload that goes through three loader stages before the final component is executed entirely in memory, never touching disk in its decrypted form.

The loader employs a series of advanced anti-detection techniques specifically designed to blind EDR products before they can raise an alert:

  • SEH/VEH-based control flow obfuscation — Structured Exception Handling (SEH) and Vectored Exception Handling (VEH) are weaponized to conceal API invocation patterns and transfer execution covertly between stages.
  • ETW suppression — Event Tracing for Windows is neutralized at runtime, depriving defenders of telemetry needed for behavioral detection.
  • Halo’s Gate syscall bypass — The loader scans ntdll.dll both forward and backward to locate clean, unhooked neighboring syscall stubs. It then repurposes those stubs to invoke desired system calls, bypassing EDR-hooked APIs without modifying any hooked code.
  • Kernel object manipulation — The loader overwrites the .mrdata section of ntdll.dll — which holds the exception dispatcher callback pointer — to redirect exception handling to its own custom routine.
  • Anti-debugging measures — The malware checks for breakpoints on KiUserExceptionDispatcher and deliberately crashes the process if one is detected.

The loader also implements geo-fencing, terminating execution if the system locale matches a post-Soviet country a deliberate exclusion list that mirrors patterns seen in other Russian-affiliated ransomware operations.

The EDR Killer

Once the multi-stage loader delivers its final payload (Stage 4), the EDR killer PE loads two kernel-level helper drivers.

  • rwdrv.sys — A renamed version of ThrottleStop.sys, legitimately signed by TechPowerUp LLC and used in tools like GPU-Z. Despite its benign origin, the driver exposes powerful IOCTLs for physical memory read/write, MSR access, and PCI configuration exploited here to directly manipulate kernel structures without going through protected virtual memory.
  • hlpdrv.sys — Used exclusively to terminate protected EDR processes via IOCTL code 0x2222008, bypassing Windows process protection mechanisms.

The EDR killer iterates through a hardcoded list of over 300 EDR driver names, using physical memory writes via rwdrv.sys to unregister monitoring callbacks for process creation, thread creation, and image loading events, disabling EDR visibility at the kernel level.

Notably, the malware temporarily overwrites the CiValidateImageHeader callback with a function that always returns true, disabling Code Integrity enforcement while the attack proceeds, then restores it afterward to reduce forensic traces.

Cisco Talos notes that while these techniques are not entirely novel, they remain highly effective and should be detectable by properly configured, multi-layered defense stacks.

The campaign demonstrates that targeting the defense layer itself before ransomware is ever deployed is now a standard operational phase for sophisticated ransomware groups like Qilin.

Organizations are strongly advised to monitor for suspicious DLL sideloading activity, unexpected driver installations (rwdrv.sys, hlpdrv.sys), and any attempts to write to physical memory from user-mode processes. Relying on a single security product is no longer sufficient against adversaries engineered specifically to neutralize it.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackExploitMalwarePatchransomwareSecurityThreat

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

OpenSSH 10.3 Update Fixes Critical Shell Injection Multiple

Next Post

Hackers Clone CERT-UA Site to Deploy Go-Based Trick Victims

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Hackers Use Fake Claude AI Installers to Infect Systems
May 7, 2026
UAT-8302 Uses Custom Malware and Open-Source Tools to Steal Data
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us