A new BYOVD attack abuses a vulnerability in the legitimate ThrottleStop.sys driver (CVE-2025-7771) to disable antivirus and EDR protections by enabling kernel-level memory manipulation from user mode. In one incident in Brazil, attackers used stolen RDP credentials, deployed a renamed version of the driver (ThrottleBlood.sys) with a malicious tool to terminate AV processes, and then launched MedusaLocker ransomware. Defenders are urged to monitor for or block the driver until a fix becomes available.
What’s new on HivePro
Get through updates and upcoming events, and more directly in your inbox