top of page

How Medusa Ransomware Bypasses Security

The Medusa ransomware group has been actively refining its attack techniques, with recent reports revealing that it is leveraging a malicious driver to bypass security solutions. This tactic, known as "Bring Your Own Vulnerable Driver" (BYOVD), is a sophisticated method that enables attackers to disable endpoint detection and response (EDR) solutions, increasing the effectiveness of their ransomware campaigns.


One of the most concerning aspects of this new attack method is the use of a driver called "ABYSSWORKER." This driver is signed using stolen or revoked certificates from Chinese vendors, allowing it to appear legitimate and evade security mechanisms that typically block unsigned or suspicious drivers.


Medusa deploys this driver alongside its ransomware payload using a loader that is packed with HeartCrypt, a packer-as-a-service (PaaS). The combination of a malicious driver and an advanced packing technique makes it significantly more difficult for security solutions to detect and stop the attack before it causes serious damage.


Once installed, the ABYSSWORKER driver plays a critical role in neutralizing security software. It is designed to:


  • Disable security processes and EDR solutions.

  • Manipulate files and terminate specific processes.

  • Remove notification callbacks from security tools, effectively blinding them.


How Medusa Ransomware Bypasses Security. Image: The Hacker News
How Medusa Ransomware Bypasses Security. Image: The Hacker News

To make detection even more challenging, the driver mimics legitimate software components, such as the Falcon driver used by CrowdStrike, a well-known cybersecurity company. This allows it to operate stealthily within the target system without immediately raising alarms.


The use of malicious drivers is not unique to Medusa. Other attack tools, such as EDRSandBlast and RealBlindingEDR, have also used similar techniques to disable endpoint security solutions. This highlights an ongoing trend among cybercriminals: developing increasingly advanced evasion methods to defeat modern security technologies.


For organizations, this development underscores the critical need for proactive security strategies. Traditional security tools alone may not be sufficient to detect and prevent such attacks. Instead, companies must adopt a multi-layered approach that includes:


  • Strictly monitoring driver installations and blocking unauthorized drivers.

  • Using behavioral analysis and anomaly detection to identify suspicious activities.

  • Keeping endpoint security solutions up to date to detect and block emerging threats.


The Medusa ransomware operation’s use of the BYOVD technique illustrates how ransomware groups continue to evolve, leveraging sophisticated methods to bypass security defenses. As these tactics become more common, businesses need to strengthen their security posture to stay ahead of emerging threats. PAGO MDR services apply the Preemptive Disruption and Containment Action methodology to detect threats in advance and block them quickly, minimizing security risks for businesses.


bottom of page