Medusa ransomware uses malicious China-linked driver to disable security tools

Medusa ransomware uses malicious China-linked driver to disable security tools

The notorious Medusa ransomware is using a malicious driver named ‘AbyssWorker’ to disable security tools on infected systems, a new report from cybersecurity firm Elastic Security Labs says.

The driver, tracked as smuol.sys, is designed to masquerade as a legitimate CrowdStrike Falcon driver, and is signed using a revoked certificate from a Chinese company. It is also shielded by VMProtect, a security tool used to obfuscate code and make analysis more challenging for researchers.

Elastic Security Labs reports that the driver has been found in dozens of malware samples dated between August 2024 and February 2025. All samples have been signed, likely using stolen certificates.

Initially spotted in the Medusa ransomware operation, malicious driver is not exclusive to the gang. Smuol.sys has been previously observed under the name ‘nbwdv.sys’, used in social engineering campaigns that ultimately led to backdoor infections on targeted systems.

The driver’s primary purpose is to disable the security tools on infected machines. Attackers exploited a flaw by signing the driver with an expired certificate. They then deployed a batch (.bat) file to disable the Windows Time Service, subsequently changing the system date to 2012, thus ensuring that the expired certificate doesn't interfere with the malicious driver's execution.

Once executed, AbyssWorker initiates a range of malicious activities on the compromised machine. The driver sets up a protection mechanism during initialization, which searches for and strips any handles to its client process from other processes, ensuring that it cannot be easily detected or interfered with.

The driver's capabilities are extensive, allowing it to perform a wide variety of malicious operations, including process manipulation, file tampering, API loading, hook removal, and even system reboots. It has the ability to terminate and permanently disable security tools.


Back to the list

Latest Posts

Raspberry Robin evolves to initial access broker

Raspberry Robin evolves to initial access broker

The malware’s attack chains have evolved to include various distribution methods.
25 March 2025
MMC zero-day bug exploited in Russia-linked EncryptHub attacks

MMC zero-day bug exploited in Russia-linked EncryptHub attacks

The attack, named ‘MSC EvilTwin,’ leverages .msc files and MUIPath to download and execute malicious payload.
25 March 2025
Austria dismantled large-scale Russia-linked disinformation campaign

Austria dismantled large-scale Russia-linked disinformation campaign

The primary goal of this operation was to sway public and political views to the detriment of Ukraine and in favor of Russia.
25 March 2025