Medusa Ransomware: How a Malicious Driver Is Silencing EDR Defenses
The Medusa ransomware group has escalated its tactics, deploying a malicious driver dubbed ABYSSWORKER to disable endpoint detection and response (EDR) solutions . This attack is part of a growing trend of bring-your-own-vulnerable-driver (BYOVD) techniques , where attackers exploit trusted but vulnerable drivers to gain deep system access. What Happened? Elastic Security Labs recently detailed a Medusa ransomware incident involving a packer-as-a-service (PaaS) tool called HeartCrypt . The HeartCrypt loader deployed a revoked certificate-signed driver — "smuol.sys" , mimicking a legitimate CrowdStrike Falcon driver. Once installed, the ABYSSWORKER driver began systematically terminating or disabling various security tools . The driver was signed using stolen, revoked certificates from Chinese vendors, giving it a veneer of legitimacy and allowing it to bypass traditional security controls . How ABYSSWORKER Works Once deployed, the ABYSSWORKER driver: Registers ...