Original Article Text

Click to Toggle View

Akira ransomware abuses CPU tuning tool to disable Microsoft Defender. Akira ransomware is abusing a legitimate Intel CPU tuning driver to turn off Microsoft Defender in attacks from security tools and EDRs running on target machines. The abused driver is 'rwdrv.sys' (used by ThrottleStop), which the threat actors register as a service to gain kernel-level access. This driver is likely used to load a second driver, 'hlpdrv.sys,' a malicious tool that manipulates Windows Defender to turn off its protections. This is a 'Bring Your Own Vulnerable Driver' (BYOVD) attack, where threat actors use legitimate signed drivers that have known vulnerabilities or weaknesses that can be abused to achieve privilege escalation. This driver is then used to load a malicious tool that disables Microsoft Defender. "The second driver, hlpdrv.sys, is similarly registered as a service. When executed, it modifies the DisableAntiSpyware settings of Windows Defender within \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware," explain the researchers. "The malware accomplishes this via execution of regedit.exe." This tactic was observed by Guidepoint Security, which reports seeing repeated abuse of the rwdrv.sys driver in Akira ransomware attacks since July 15, 2025. "We are flagging this behavior because of its ubiquity in recent Akira ransomware IR cases. This high-fidelity indicator can be used for proactive detection and retroactive threat hunting," continued the report. To help defenders detect and block these attacks, Guidepoint Security has provided a YARA rule for hlpdrv.sys, as well as complete indicators of compromise (IoCs) for both drivers, their service names, and file paths where they are dropped. Akira attacks on SonicWall SSLVPN Akira ransomware was recently linked to attacks on SonicWall VPNs using what is believed to be an unknown flaw. Guidepoint Security says it could neither confirm nor debunk the exploitation of a zero-day vulnerability in SonicWall VPNs by Akira ransomware operators. In response to reports about elevated offensive activity, SonicWall advised disabling or restricting SSLVPN, enforcing multi-factor authentication (MFA), enabling Botnet/Geo-IP protection, and removing unused accounts. Meanwhile, The DFIR Report has published an analysis of recent Akira ransomware attacks, highlighting the use of the Bumblebee malware loader delivered via trojanized MSI installers of IT software tools. An example involves searches for "ManageEngine OpManager" on Bing, where SEO poisoning redirected the victim to the malicious site opmanager[.]pro. Bumblebee is launched via DLL sideloading, and once C2 communication is established, it drops AdaptixC2 for persistent access. The attackers then conduct internal reconnaissance, create privileged accounts, and exfiltrate data using FileZilla, while maintaining access via RustDesk and SSH tunnels. After approximately 44 hours, the main Akira ransomware payload (locker.exe) is deployed to encrypt systems across domains. Until the SonicWall VPN situation clears up, system administrators should monitor for Akira-related activity and apply filters and blocks as indicators emerge from security research. It is also strongly advised to only download software from official sites and mirrors, as impersonation sites have become a common source for malware. Red Report 2025: Analyzing the Top ATT&CK Techniques Used by 93% of Malware Malware targeting password stores surged 3X as attackers executed stealthy Perfect Heist scenarios, infiltrating and exploiting critical systems. Discover the top 10 MITRE ATT&CK techniques behind 93% of attacks and how to defend against them.

Daily Brief Summary

MALWARE // Akira Ransomware Exploits CPU Tool to Disable Microsoft Defender

Akira ransomware is leveraging a legitimate Intel CPU tuning driver, rwdrv.sys, to disable Microsoft Defender, impacting security defenses on target machines.

This attack utilizes a "Bring Your Own Vulnerable Driver" (BYOVD) strategy, exploiting known vulnerabilities in legitimate drivers for privilege escalation.

The malicious driver, hlpdrv.sys, modifies Windows Defender settings via regedit.exe, effectively turning off spyware protections.

Guidepoint Security has observed consistent abuse of rwdrv.sys in Akira ransomware incidents since mid-July 2025, providing high-fidelity indicators for threat detection.

To counter these threats, Guidepoint Security released a YARA rule and indicators of compromise for both drivers, aiding in proactive defense measures.

Akira ransomware has also been linked to potential zero-day exploits in SonicWall VPNs, prompting security advisories to restrict SSLVPN access and enforce multi-factor authentication.

The DFIR Report details Akira's use of Bumblebee malware loader via trojanized software, emphasizing the need for vigilance against SEO poisoning and downloading from official sources.

Organizations are advised to monitor for Akira-related activities and apply recommended security measures to mitigate risks effectively.