New BYOVD loader behind DeadLock ransomware attack
Dec. 21, 2025, 6:54 p.m.
Description
A new loader exploiting a Baidu Antivirus driver vulnerability (CVE-2024-51324) has been discovered in connection with DeadLock ransomware attacks. The threat actor uses the Bring Your Own Vulnerable Driver (BYOVD) technique to terminate endpoint detection and response processes. A PowerShell script is employed to bypass User Account Control, disable Windows Defender, terminate security services, and delete volume shadow copies. DeadLock ransomware targets Windows machines using a custom stream cipher encryption algorithm with time-based cryptographic keys. The attack involves initial access through compromised accounts, system registry modifications, remote access establishment, reconnaissance, lateral movement, and defense impairment. The ransomware's sophisticated encryption process includes recursive directory traversal, memory-mapped file I/O, and multi-threaded processing.
Tags
Date
- Created: Dec. 10, 2025, 9:43 a.m.
- Published: Dec. 10, 2025, 9:43 a.m.
- Modified: Dec. 21, 2025, 6:54 p.m.
Indicators
- 47ec51b5f0ede1e70bd66f3f0152f9eb536d534565dbb7fcc3a05f542dbe4428
- be1037fac396cf54fb9e25c48e5b0039b3911bb8426cbf52c9433ba06c0685ce
- 2d89fb7455ff3ebf6b965d8b1113857607f7fbda4c752ccb591dbc1dc14ba0da
- 3cd5703d285ed2753434f14f8da933010ecfdc1e5009d0e438188aaf85501612
- 3c1b9df801b9abbb3684670822f367b5b8cda566b749f457821b6481606995b3