Blog – May 12, 2026
Your EDR Is the First Thing Ransomware Kills
Ransomware operators have a problem, and they solved it years ago.
The problem: enterprise security teams have deployed endpoint detection and response tools broadly, and those tools are getting better at catching known ransomware behaviors. The solution attackers landed on is straightforward and brutal. Kill the EDR first.
This is not theoretical. It is documented, actively exploited, and showing up in post-incident reports across organizations of every size. Security practitioners on community forums are asking the same question after every breach: “We had EDR running on every endpoint. How did this happen?”
The answer is that your EDR was the first casualty, not the last line of defense.
Bring Your Own Vulnerable Driver
The technique enabling this at scale is called Bring Your Own Vulnerable Driver, or BYOVD. Here is how it works:
Ransomware actors include a legitimately signed but vulnerable Windows driver in their toolkit. Because the driver is signed, Windows treats it as trusted. Once loaded, the attackers exploit the vulnerability in that driver to gain kernel-level privileges. From the kernel, they can terminate any process on the system, including your EDR agent.
The VEN0m ransomware group made headlines in early 2026 for using a signed IObit driver to bypass Windows Defender entirely. The driver passed code-signing checks. Defender had no grounds to block it. VEN0m used it to shut down endpoint protection across the environment before executing their payload.
This maps to MITRE ATT&CK T1562.001 (Impair Defenses: Disable or Modify Tools) combined with T1068 (Exploitation for Privilege Escalation). It is not a novel technique. It has been in active use since at least 2022, and ransomware groups have built reliable toolkits around it.
The security community noticed. On Reddit, one thread titled “Ransomware crews don’t care about your endpoint security, they’ve already killed it” generated over 300 upvotes and 90 comments. Practitioners sharing incident notes, not speculation.
What Happens After EDR Goes Dark
Once the endpoint agent is terminated, the attacker operates in a blind spot. No telemetry. No alerts. No behavioral detections. The SIEM stops receiving events from the compromised host, which might generate an alert about a silent agent but rarely triggers an immediate response before lateral movement is complete.
From that point, the attacker follows a consistent playbook:
First, they move laterally using living-off-the-land techniques: PsExec, WMI, RDP, SMB file shares. These are all legitimate administrative tools. Without EDR running to monitor process behavior, there is nothing to flag them as suspicious.
Second, they locate and disable backup systems, whether cloud or local, to eliminate recovery options and maximize extortion leverage.
Third, they exfiltrate data for double-extortion before encrypting. This is the phase where victims later discover that sensitive data was leaving the network for days while the environment looked normal.
Finally, they detonate. Encryption propagates across the network. By the time the first ransom note appears on a screen, the attacker has often been in the environment for weeks.
One post from r/sysadmin described exactly this sequence at a small business: “They actually did their homework. They sat in the network for three weeks before doing anything.” The business had endpoint protection. It did not matter.
The Assumption That Breaks Down
The entire endpoint-centric security model rests on one assumption: the agent will be running when it needs to act.
BYOVD invalidates that assumption at the kernel level before any malicious payload executes. By the time ransomware is detonating, the agent is already gone.
This is not a criticism of EDR as a category. EDR tools are valuable, and they catch a significant volume of attacks that never escalate to the BYOVD stage. The problem is architectural: a defense layer that can be neutralized by the attacker before it gets a chance to fire is not a reliable last line of defense.
A network-layer enforcement approach does not share this weakness. Traffic inspection and blocking happens at the network infrastructure level, not on the endpoint, and does not depend on an agent process that can be killed. Even after an EDR agent is taken offline, the network layer continues to:
- Block outbound connections to known command-and-control infrastructure
- Prevent lateral movement traffic from reaching other segments
- Stop data exfiltration callbacks before sensitive data leaves the environment
- Flag anomalous traffic patterns that indicate a host is compromised
The attacker can kill the process on the endpoint. They cannot kill enforcement that happens outside the endpoint.
Detection Opportunities That Still Exist
Even after EDR is disabled, defenders are not without options if they have network visibility. Several indicators appear at the network layer before or during BYOVD attacks:
Driver staging traffic: Attackers often download the vulnerable driver from an external source or transfer it via C2 infrastructure. This traffic is visible at the network layer and can be blocked if the destination is known-malicious or flagged by threat intelligence.
C2 beaconing: Most post-exploitation frameworks check in with a remote server on a regular interval. Even after the EDR agent is dead, this traffic continues and is visible on the wire.
Lateral movement patterns: SMB traffic suddenly flowing between hosts that have no business communicating, RDP connections from unexpected sources, WMI calls across segments, these patterns show up in network traffic regardless of what is happening on the endpoint.
Exfiltration volume: Large sustained transfers to external destinations stand out in network flow data even when the process generating them looks legitimate.
This is why network visibility is not a complement to endpoint protection. It is a separate detection and enforcement surface that operates independently of what is happening on any individual host.
The Defender Checklist
If you are reassessing your architecture in light of the BYOVD threat, start here:
- Verify your EDR vendor’s response to BYOVD: does the agent protect its own process and how?
- Test whether your stack generates alerts when an EDR agent is terminated, and how quickly
- Confirm you have east-east network visibility, not just perimeter monitoring
- Check whether outbound connections from compromised hosts would be blocked even if endpoint telemetry goes silent
- Review your threat intelligence feeds for known-bad driver hashes and BYOVD-associated infrastructure
The Layer That Cannot Be Killed From the Endpoint
Ransomware groups are not getting smarter because they found a new class of vulnerability. They are getting more effective because they learned to remove the tools defenders rely on before executing their attack.
If your security posture depends entirely on endpoint agents being present and running, you have a single point of failure that attackers have already learned to target. Network-layer enforcement that operates independently of endpoint state is not a backup plan. In a BYOVD scenario, it is your primary catch layer.
threatER’s preemptive threat prevention operates at the network layer, blocking malicious traffic and lateral movement regardless of endpoint agent status. See how it works at threater.com.