In today's high stakes cybersecurity landscape, businesses cannot afford to rely solely on detection and response. A recent report from TechRadar Pro reveals a chilling new development: a "killer" tool that actively disables antivirus and endpoint detection systems before ransomware is unleashed (techradar.com).
The New Threat: EDR Killer Tools
Sophos researchers warn that multiple ransomware groups, from RansomHub to BlackSuit to Medusa and beyond, are using a potent, evolved variant of the EDRKillShifter tool. This tool can disable security software from big names like Sophos, Bitdefender, and Kaspersky. It operates by hijacking signed drivers (often stolen or compromised) and packing malicious code using tools like HeartCrypt for obfuscation.
These tactics are not isolated. At least eight ransomware gangs, including Medusa, Qilin, and DragonForce, deploy versions tailored to their purposes. The tool hunts for a digitally signed driver, masquerading as something legitimate like the CrowdStrike sensor driver, then loads it to gain kernel level access and disable security tools across the board.
Sometimes, attackers embed the malicious payload into legitimate utilities such as Beyond Compare's Clipboard Compare tool. Injected code executes at runtime to shut down EDR or antivirus before deploying an encryptor.
In other instances, attackers use a "Bring Your Own Vulnerable Driver" (BYOVD) approach, abusing well known drivers like ThrottleStop.sys to break into kernel space and terminate security services. A case in Brazil highlighted how AV killer malware used ThrottleStop.sys to disable antivirus and pave the way for ransomware such as MedusaLocker.
Why Detect and Respond Alone Is Not Enough
These EDR killer tools are a wake up call. They show that by the time detection kicks in, it is often too late. If the EDR or antivirus is already disabled, the attacker moves unchallenged into encryption and extortion. It is a clear sign that reactive defense needs to be replaced or at least supplemented with proactive measures that isolate threats before they can strike.
Moving Toward Isolation and Containment: How AppGuard Helps
This is where AppGuard shines. With a decade long track record in endpoint protection, AppGuard does not just detect threats, it isolates and contains them.
Here is what makes AppGuard essential in this new threat environment:
-
Pre execution isolation: Even if malware embeds itself within legitimate tools or drivers, AppGuard's containment architecture ensures it cannot execute in harmful ways on critical systems.
-
Kernel level containment: Attack tools that rely on kernel privileges, like EDR killer variants or BYOVD approaches, are thwarted by AppGuard's tight control over execution across privilege levels.
-
Defense in depth with longevity: With 10 years of proven results, AppGuard has evolved alongside emerging threats. It offers more than traditional antivirus, it is a hardened, proactive security layer for modern endpoints.
-
Minimized reliance on detection signatures: Since AppGuard does not rely on recognizing known threats, it remains effective even against novel obfuscated or packed malware, such as those packed with HeartCrypt or injected into legitimate utilities.
In short, AppGuard creates a protective barrier around your endpoints. Instead of waiting to detect an intrusion, it works to prevent malicious code from ever impacting your system.
Call to Action
Business owners: now is the time to move from Detect and Respond to Isolation and Containment. Traditional antivirus and EDR tools are being targeted. Do not wait until your defenses are bypassed.
Talk with us at CHIPS about how AppGuard can safeguard your organization from these emergent threats. Let us help you build resilience today, before it is too late.
Like this article? Please share it with others!

August 15, 2025
Comments