New BYOVD loader behind DeadLock ransomware attack

Dec. 21, 2025, 6:54 p.m.

Description

A new loader exploiting a Baidu Antivirus driver vulnerability (CVE-2024-51324) has been discovered in connection with DeadLock ransomware attacks. The threat actor uses the Bring Your Own Vulnerable Driver (BYOVD) technique to terminate endpoint detection and response processes. A PowerShell script is employed to bypass User Account Control, disable Windows Defender, terminate security services, and delete volume shadow copies. DeadLock ransomware targets Windows machines using a custom stream cipher encryption algorithm with time-based cryptographic keys. The attack involves initial access through compromised accounts, system registry modifications, remote access establishment, reconnaissance, lateral movement, and defense impairment. The ransomware's sophisticated encryption process includes recursive directory traversal, memory-mapped file I/O, and multi-threaded processing.

Date

  • Created: Dec. 10, 2025, 9:43 a.m.
  • Published: Dec. 10, 2025, 9:43 a.m.
  • Modified: Dec. 21, 2025, 6:54 p.m.

Indicators

  • 47ec51b5f0ede1e70bd66f3f0152f9eb536d534565dbb7fcc3a05f542dbe4428
  • be1037fac396cf54fb9e25c48e5b0039b3911bb8426cbf52c9433ba06c0685ce
  • 2d89fb7455ff3ebf6b965d8b1113857607f7fbda4c752ccb591dbc1dc14ba0da
  • 3cd5703d285ed2753434f14f8da933010ecfdc1e5009d0e438188aaf85501612
  • 3c1b9df801b9abbb3684670822f367b5b8cda566b749f457821b6481606995b3

Attack Patterns

Linked vulnerabilities