Medusa Ransomware Exploits Malicious Driver to Neutralize Anti-Malware with Hijacked Certificates

The actors responsible for the Medusa ransomware-as-a-service (RaaS) campaign have utilized a malevolent driver known as ABYSSWORKER in executing a bring your own vulnerable driver (BYOVD) tactic intended to circumvent anti-malware solutions.

The actors responsible for the Medusa ransomware-as-a-service (RaaS) campaign have utilized a malevolent driver known as ABYSSWORKER in executing a bring your own vulnerable driver (BYOVD) tactic intended to circumvent anti-malware solutions.
According to Elastic Security Labs, there have been instances of Medusa ransomware assaults where the encryption payload was delivered through a loader that had been secured with a packer-as-a-service (PaaS).

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.