ThrottleStop driver abused to terminate AV processes

A recent incident response case in Brazil revealed a new antivirus (AV) killer software circulating since October 2024. This malware abuses the ThrottleStop.sys driver to terminate numerous antivirus processes, employing a technique known as BYOVD (Bring Your Own Vulnerable Driver). The attack began with a valid RDP credential, followed by lateral movement using pass-the-hash techniques. The AV killer, consisting of ThrottleBlood.sys and All.exe, exploits a vulnerability (CVE-2025-7771) in the legitimate ThrottleStop driver to disable system defenses. The malware targets multiple antivirus processes from various vendors, using kernel function hijacking to terminate them. Victims have been identified primarily in Russia, Belarus, Kazakhstan, Ukraine, and Brazil. Author: AlienVault

Related Tags:
kernel exploitation

cve-2025-7771

av killer

driver abuse

MedusaLocker

T1562.006

BYOVD

T1543.003

T1489

Associated Indicators:
53EC23E45303511066B478BC58E02DF108417D748BDBECC3BB55A881A26F90A4

C0979EC20B87084317D1BFA50405F7149C3B5C5F

0A15BE464A603B1EEBC61744DC60510CE169E135

EFF7919D5DE737D9A64F7528E86E3666051A49AA

D5A050C73346F01FC9AD767D345ED36C221BAAC2

DCAED7526CDA644A23DA542D01017D48D97C9533

987834891CEA821BCD3CE1F6D3E549282D38B8D3

F02DAF614109F39BABDCB6F8841DD6981E929D70

86A2A93A31E0151888C52DBBC8E33A7A3F4357DB