Connect with us

    Hi, what are you looking for?

    Tech

    Blackbyte Ransomware Abuses Legit Driver to Disable Security Products, Says NCC-CSIRT

    NCC

    The Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) has flagged a high-impact threat to Windows operating system, the Blackbyte Ransomware, which has the capacity to bypass protections by disabling more than 1,000 drivers used by various security solutions.

    The NCC-CSIRT said the BlackByte ransomware gang, which is using a new technique that researchers called, “Bring Your Own Vulnerable Driver,” is exploiting the security issue that allowed it to disable drivers that prevent multiple Endpoint Detection and Response (EDR) and antivirus products like Avast, Sandboxie, Windows DbgHelp Library, and Comodo Internet Security, from operating normally.

    Recent attacks attributed to this group involved a version of the MSI Afterburner RTCore64.sys driver, which is vulnerable to a privilege escalation and code execution flaw tracked as CVE-2019-16098.

    Read Also: NCC, NLRC Inaugurate Committee to Strengthen Consumer Protection

    The “Bring Your Own Vulnerable Driver” (BYOVD) method is effective because the vulnerable drivers are signed with a valid certificate and run with high privileges on the system.

    Two notable recent examples of BYOVD attacks include Lazarus, abusing a buggy Dell driver and unknown hackers abusing an anti-cheat driver/module for the Genshin Impact game.

    The NCC-CSIRT advisory recommended that system administrators protect against BlackByte’s new security bypassing trick by adding the particular MSI driver to an active blocklist, monitoring all driver installation events, and scrutinising them frequently to find any rogue injections that do not have a hardware match.

    The CSIRT is the telecom sector’s cyber security incidence centre set up by the NCC to focus on incidents in the telecom sector and as they may affect telecom consumers and citizens at large.

    The CSIRT also works collaboratively with the Nigeria Computer Emergency Response Team (ngCERT), established by the Federal Government to reduce the volume of future computer risk incidents by preparing, protecting, and securing Nigerian cyberspace to forestall attacks, and problems or related events.

    Loading

    Spread the love
    Click to comment

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    ad

    You May Also Like

    News

    Presidency has clarified the controversy surrounding the ₦3.3 trillion debt settlement plan approved by President Bola Tinubu for power generation companies (GenCos), stating that...

    E-Financial

    As the Central Bank of Nigeria’s (CBN) recapitalisation exercise came to an end March 31, 2026, most banks operating in the country rose to...

    News

    The Vice President of the Governing Council of the Fintech Association of Nigeria, Dr. Jameelah Sharrieff-Ayedun, is set to deliver a keynote address at...

    World

    U.S politician, Eric Swalwell has announced he is stepping down from Congress, citing the need to avoid further distraction amid ongoing controversies. In a...