Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

980+ Articles
124+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Reynolds Ransomware Embeds BYOVD Driver to Disable EDR
Reynolds Ransomware Embeds BYOVD Driver to Disable EDR
NEWS

Reynolds Ransomware Embeds BYOVD Driver to Disable EDR

A new ransomware strain called Reynolds bundles a Bring Your Own Vulnerable Driver component directly in its payload, killing EDR processes from...

Dylan H.

News Desk

February 17, 2026
2 min read

New Ransomware Innovation

A newly discovered ransomware strain dubbed Reynolds is raising alarms across the security community for its novel approach to defense evasion. Unlike previous BYOVD (Bring Your Own Vulnerable Driver) attacks that dropped a separate tool, Reynolds packages the vulnerable driver and ransomware payload together in a single binary — making attacks quieter and faster.


How It Works

StageDescription
DeliveryStandard initial access via phishing or exploited VPN
Driver LoadEmbeds the vulnerable NsecSoft NsecKrnl driver (CVE-2025-68947)
EDR KillUses the kernel-level driver to terminate security processes
EncryptionEncrypts files after defenses are disabled

Targeted EDR Products

The Reynolds payload targets and kills processes from:

  • CrowdStrike Falcon
  • Sophos Intercept X
  • Microsoft Defender for Endpoint
  • Symantec Endpoint Protection
  • ESET NOD32
  • Avast/AVG

Why This Matters

Previous BYOVD techniques required attackers to deploy a separate driver-loading tool before executing the ransomware — a two-stage process that gave defenders more detection opportunities. Reynolds eliminates this gap by combining both stages into a single payload, significantly reducing the window for detection.

The bundled approach means:

  • Fewer artifacts on disk for EDR to catch
  • Shorter dwell time between driver load and encryption
  • Single execution rather than multi-stage deployment

Defensive Recommendations

  1. Implement driver blocklist policies via Windows Defender Application Control (WDAC) or Microsoft's recommended driver block rules
  2. Monitor for vulnerable driver loading — the NsecKrnl driver hash should be blocked at the kernel level
  3. Enable tamper protection on all endpoint security products
  4. Deploy application whitelisting to prevent unauthorized executables
  5. Maintain offline backups tested regularly for restoration

Indicators of Compromise

Security teams should monitor for:

  • NsecKrnl driver loading events (Event ID 6, Sysmon)
  • Rapid termination of multiple security service processes
  • Service Control Manager events showing EDR services stopping unexpectedly

Reynolds represents an evolution in ransomware tactics. Organizations relying solely on EDR for protection should implement defense-in-depth strategies including driver blocklists and application control policies.

#Ransomware#BYOVD#EDR Evasion#Reynolds#Endpoint Security#CrowdStrike#Sophos

Related Articles

Payouts King Ransomware Uses QEMU Virtual Machines to Bypass Endpoint Security

The Payouts King ransomware group is deploying the QEMU open-source emulator as a covert reverse SSH backdoor, spinning up hidden virtual machines on...

5 min read

Foxconn Confirms Cyberattack Claimed by Nitrogen Ransomware Gang

Foxconn, the world's largest electronics manufacturer, confirmed a cyberattack on its North American factories claimed by the Nitrogen ransomware gang, with operations now working to recover from the disruption.

4 min read

Government to Scrutinize Instructure Over Canvas Disruption, Data Breach

The House Committee on Homeland Security has demanded a briefing from Instructure, the company behind the Canvas LMS platform, after a ransomware attack by ShinYHunters disrupted universities nationwide and triggered a 365TB extortion threat.

4 min read
Back to all News