BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
NERF
The Vault
Threat Actors
Privacy Threats
Malware IoC
Dashboard
CVEs
Tags
Intel
NERFThe VaultThreat ActorsPrivacy ThreatsMalware IoCDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
•
© 2026
•
blacktemple.net
  1. Feed
  2. /Ransomware Groups Weaponize EDR Bypass Techniques as DPRK Executes $285M Crypto Heist

Ransomware Groups Weaponize EDR Bypass Techniques as DPRK Executes $285M Crypto Heist

highVulnerabilities & Exploits|April 6, 20263 min read

Originally reported by The Hacker News, SANS ISC

#ransomware#byovd#edr-bypass#qilin#warlock#dprk#social-engineering#cryptocurrency
Share

TL;DR

Multiple ransomware groups are actively using bring-your-own-vulnerable-driver techniques to disable security tools, while North Korean threat actors executed a sophisticated six-month social engineering operation culminating in a $285 million cryptocurrency theft.

Why high?

Active ransomware campaigns using sophisticated EDR bypass techniques combined with a major DPRK-attributed cryptocurrency theft represent significant ongoing threats to enterprise security infrastructure.

Ransomware Operations Evolve EDR Evasion Tactics

Multiple threat intelligence firms have documented sophisticated evasion techniques employed by prominent ransomware groups, highlighting the ongoing arms race between attackers and security vendors.

Qilin and Warlock Deploy BYOVD Against Security Tools

Cisco Talos and Trend Micro researchers have identified Qilin and Warlock ransomware operators leveraging bring-your-own-vulnerable-driver (BYOVD) techniques to disable over 300 endpoint detection and response (EDR) tools. The attacks deploy a malicious DLL named "msimg32.dll" as part of the evasion strategy.

The BYOVD technique allows threat actors to abuse legitimate but vulnerable signed drivers to gain kernel-level privileges, effectively neutralizing security software before deploying ransomware payloads. This approach represents a significant evolution in ransomware tactics, as it directly targets the defensive tools organizations rely on for threat detection and response.

German Authorities Identify REvil Leadership

Germany's Federal Criminal Police Office (BKA) has unmasked the real identities of two key figures from the defunct REvil (Sodinokibi) ransomware-as-a-service operation. One threat actor, operating under the alias "UNKN," served as a group representative and advertised the ransomware on the XSS cybercrime forum in June 2019.

The identification connects these individuals to 130 ransomware attacks against German targets, providing law enforcement with concrete attribution for a significant portion of REvil's operations in the region.

DPRK Executes Sophisticated Cryptocurrency Heist

Six-Month Social Engineering Campaign Yields $285M

Drift, a Solana-based decentralized exchange, has disclosed that the April 1, 2026 attack resulting in $285 million in stolen cryptocurrency was the culmination of a six-month targeted social engineering operation attributed to North Korean threat actors. The campaign began in fall 2025 and demonstrates the DPRK's continued focus on cryptocurrency theft to circumvent international sanctions.

The extended timeline suggests a highly sophisticated operation involving extensive reconnaissance and relationship building with Drift personnel, marking another evolution in state-sponsored cryptocurrency targeting.

Phishing Infrastructure Analysis

Open Redirects in 2026 Threat Landscape

SANS Internet Storm Center researchers have published analysis examining the prevalence of open redirect abuse in current phishing campaigns. The research builds on previous findings about threat actors actively seeking vulnerable redirect mechanisms to obscure malicious destinations and evade detection systems.

The analysis provides insights into how attackers are adapting their infrastructure tactics to maintain effectiveness against improved email security filters and user awareness programs.

Sources

  • Qilin and Warlock Ransomware Use Vulnerable Drivers to Disable 300+ EDR Tools
  • BKA Identifies REvil Leaders Behind 130 German Ransomware Attacks
  • $285 Million Drift Hack Traced to Six-Month DPRK Social Engineering Operation
  • How often are redirects used in phishing in 2026?, (Mon, Apr 6th)
  • ISC Stormcast For Monday, April 6th, 2026

Originally reported by The Hacker News, SANS ISC

Tags

#ransomware#byovd#edr-bypass#qilin#warlock#dprk#social-engineering#cryptocurrency

Threat Actors

🇷🇺REvil
🏴Qilin

Related Intelligence

  • TeamPCP Supply Chain Attacks Escalate with LiteLLM Compromise, Tax Season Malvertising Campaign Targets EDR

    criticalMar 25, 2026
  • Weekly Threat Intel: Ransomware Strikes Politics, Supply Chain Attacks Target NPM, LinkedIn's Browser Surveillance

    highApr 4, 2026
  • Supply Chain Attacks and Malware Campaigns Dominate Weekly Threat Landscape

    highApr 2, 2026

Related Knowledge

  • NERF Training: Vulnerability Research Deep Dive

    offensive
  • NERF Web Security Deep Dive — Training Knowledge Base

    offensive
  • NERF Offensive Security Deep Reference

    offensive

Explore

  • Dashboard
  • Privacy Threats
  • Threat Actors
← Back to the feed

Previous Article

← UK Intelligence Reportedly Censored Climate Security Assessment

Next Article

German Authorities Identify REvil and GandCrab Ransomware Leader as Russian National→