Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

429+ Articles
114+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Reynolds Ransomware Embeds BYOVD Driver to Disable EDR
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR
NEWS

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR

A new ransomware strain called Reynolds bundles a Bring Your Own Vulnerable Driver component directly in its payload, killing EDR processes from...

Dylan H.

News Desk

February 17, 2026
2 min read

New Ransomware Innovation

A newly discovered ransomware strain dubbed Reynolds is raising alarms across the security community for its novel approach to defense evasion. Unlike previous BYOVD (Bring Your Own Vulnerable Driver) attacks that dropped a separate tool, Reynolds packages the vulnerable driver and ransomware payload together in a single binary — making attacks quieter and faster.


How It Works

StageDescription
DeliveryStandard initial access via phishing or exploited VPN
Driver LoadEmbeds the vulnerable NsecSoft NsecKrnl driver (CVE-2025-68947)
EDR KillUses the kernel-level driver to terminate security processes
EncryptionEncrypts files after defenses are disabled

Targeted EDR Products

The Reynolds payload targets and kills processes from:

  • CrowdStrike Falcon
  • Sophos Intercept X
  • Microsoft Defender for Endpoint
  • Symantec Endpoint Protection
  • ESET NOD32
  • Avast/AVG

Why This Matters

Previous BYOVD techniques required attackers to deploy a separate driver-loading tool before executing the ransomware — a two-stage process that gave defenders more detection opportunities. Reynolds eliminates this gap by combining both stages into a single payload, significantly reducing the window for detection.

The bundled approach means:

  • Fewer artifacts on disk for EDR to catch
  • Shorter dwell time between driver load and encryption
  • Single execution rather than multi-stage deployment

Defensive Recommendations

  1. Implement driver blocklist policies via Windows Defender Application Control (WDAC) or Microsoft's recommended driver block rules
  2. Monitor for vulnerable driver loading — the NsecKrnl driver hash should be blocked at the kernel level
  3. Enable tamper protection on all endpoint security products
  4. Deploy application whitelisting to prevent unauthorized executables
  5. Maintain offline backups tested regularly for restoration

Indicators of Compromise

Security teams should monitor for:

  • NsecKrnl driver loading events (Event ID 6, Sysmon)
  • Rapid termination of multiple security service processes
  • Service Control Manager events showing EDR services stopping unexpectedly

Reynolds represents an evolution in ransomware tactics. Organizations relying solely on EDR for protection should implement defense-in-depth strategies including driver blocklists and application control policies.

#Ransomware#BYOVD#EDR Evasion#Reynolds#Endpoint Security#CrowdStrike#Sophos

Related Articles

Bearlyfy Hits Russian Firms with Custom GenieLocker Ransomware

Pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian companies since January 2025, recently deploying a custom Windows ransomware strain called GenieLocker in targeted operations.

4 min read

Pro-Ukraine Hacker Group Bearlyfy Targets Russian Companies with Custom Ransomware

The pro-Ukrainian hacktivist group Bearlyfy has conducted over 70 cyberattacks against Russian businesses in the past year and is escalating operations...

4 min read

Manager of Botnet Used in Ransomware Attacks Gets 2 Years in Prison

Ilya Angelov, co-leader of the TA551/Mario Kart cybercrime group, was sentenced to two years in prison for operating a phishing botnet that sent 700,000...

4 min read
Back to all News