What happens when the bodyguard becomes the assassin? In a chilling twist, a new malware campaign flips the script, hijacking Avast’s trusted Anti-Rootkit driver (aswArPot.sys) to wreak havoc. This Bring Your Own Vulnerable Driver (BYOVD) attack takes kernel-level access to new lows—disabling security software, eliminating antivirus processes, and putting your system in a stranglehold.
This isn’t just a malware attack; it’s a high-stakes heist where the trusted becomes treacherous. Read on as we break down the dirty deeds and arm you with the tools to fight back.
The Killer Chain Reaction
It starts innocently enough—or so it seems. The malware (kill-floor.exe)sneaks in, dropping a legitimate Avast driver (aswArPot.sys) disguised as ntfs.bin in: C:\Users\Default\AppData\Local\Microsoft\Windows.
Here’s how it unravels:
- Step One: Build the Weapon
- Using sc.exe, the malware creates a service to load the Avast driver.
- Boom: it now has full kernel-level access.
- Step Two: Name, Shame, and Slay
- With 142 hardcoded targets on its kill list, the malware hunts down security processes like a methodical assassin.
- It snaps a photo of every running process, then compares it to its hit list.
- Step Three: Execute the Kill Order
- Using the DeviceIoControl API, the malware whispers an IOCTL code (0x9988c094) to the driver.
- Kernel-level functions like ZwTerminateProcess do the dirty work, terminating security software and leaving the system defenseless.
How to Stay One Step Ahead
Bring Your Own Vulnerable Driver attacks are as sneaky as they are devastating. Here’s how to flip the script:
- Deploy BYOVD Bouncers Use expert rules to block sketchy drivers
- Upgrade Your Driver Club Standards
- Enforce strict driver signature policies. If it’s not signed and sealed, it’s not running.
- Regularly patch and update drivers to close known loopholes.
- Kernel Armor: Harden the Core
- Monitor kernel-level activities with behavioral analytics tools.
- Use zero-trust principles to limit driver permissions to “just enough.”
- Watch the Usual Suspect Directories
The directory C:\Users\Default\AppData\Local\Microsoft\Windows is the malware’s hideout. Keep an eye on it like your life depends on it—because it might.