Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Microsoft Patch Tuesday May 2026: Vulnerabilities Fixed
May 12, 2026
Critical Fortinet FortiSandbox Flaw Allows Vulnerability Enables
May 12, 2026
Fortinet Patches Five Vulnerabilities in Forti Across FortiAP
May 12, 2026
Home/CyberSecurity News/Researcher Reverse Engineers 0-Day Disabling CrowdStrike E
CyberSecurity News

Researcher Reverse Engineers 0-Day Disabling CrowdStrike E

Leading endpoint security solutions, including CrowdStrike Falcon, are vulnerable to a newly disclosed Bring Your Own Vulnerable Driver (BYOVD) attack. A cybersecurity researcher recently uncovered...

Marcus Rodriguez
Marcus Rodriguez
April 14, 2026 2 Min Read
7 0

Leading endpoint security solutions, including CrowdStrike Falcon, are vulnerable to a newly disclosed Bring Your Own Vulnerable Driver (BYOVD) attack. A cybersecurity researcher recently uncovered this method, which can effectively disable these top-tier defenses.

By reverse-engineering a previously unknown zero-day kernel driver, the researcher revealed how threat actors use legitimately signed drivers to bypass endpoint detection and response (EDR) systems completely.

In BYOVD attacks, hackers deploy a trusted but flawed driver on a compromised machine to exploit its elevated kernel privileges.

The investigation identified over 15 distinct variants of this malicious driver. Despite their destructive capabilities, all variants carry valid Microsoft digital signatures and have not been blocked or revoked by the vendor.

Alarmingly, scans on platforms like VirusTotal show zero detections from modern antivirus engines.

Because the driver is signed and highly trusted, Windows allows it to load into kernel mode without triggering any security alerts, giving attackers a stealthy foothold.

Reverse Engineering the IOCTL

During technical analysis using IDA Pro, the researcher bypassed an obfuscated entry point to examine the driver’s core device-control handler.

Decompilation failure in DriverEntry(source :core-jmp)
Decompilation failure in DriverEntry(source :core-jmp)

After cleaning up the heavily mangled decompiled code, they discovered a dangerous input/output control (IOCTL) interface. Specifically, the IOCTL code 0x22E010 triggers a dedicated process-killing routine.

The driver accepts a process ID as a string, converts it to an integer using standard C functions, and then executes the termination command. The true danger lies in how the driver terminates security processes from the kernel level.

It uses the ZwOpenProcess and ZwTerminateProcess kernel functions to terminate active applications forcibly.

Creating the POC(source :core-jmp)
Creating the POC(source :core-jmp)

In standard user mode, attempting to close a Protected Process Light (PPL) service, such as CrowdStrike, results in an immediate access denial.

However, kernel-level commands bypass these user-mode protections entirely, allowing the driver to silently kill critical security agents before attackers deploy ransomware or other secondary payloads.

To validate the vulnerability, the core-jmp researcher dynamically tracked the driver in a test environment to locate its symbolic link, identified as \.{F8284233–48F4–4680-ADDD-F8284233}.

After running POC(source :core-jmp)
After running POC(source :core-jmp)

Using this link alongside the discovered IOCTL code, they developed a custom proof-of-concept exploit named PoisonKiller.

When loaded via standard command-line service tools, the exploit successfully targeted and terminated the active CrowdStrike EDR process.

The complete technical analysis and exploit code have been published on GitHub, highlighting a critical blind spot in how modern operating systems handle signed third-party drivers.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCybersecurityExploitHackerransomwareSecurityThreatVulnerabilityzero-day

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

W3LL Phishing Kit Takedown Halts Global Hits Credential

Next Post

Hackers Steal User Data Using 108 Mal Chrome Extensions

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Open WebUI File Upload Vulnerability Allows 1 Leads Attack
May 12, 2026
SAP Patches Critical SQL Injection Flaw in S/4 Vulnerability S/4HANA
May 12, 2026
Zoom Rooms Vulnerabilities Allow Attackers to Escalate
May 12, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us