Medusa Ransomware Uses Malicious Driver to Disable Security Tools
The Medusa ransomware has been found deploying a malicious driver from a Chinese vendor to disable security tools on compromised systems, according to cybersecurity firm Elastic Security Labs.
A Fake CrowdStrike Driver with Stolen Certificates identified as smuol.sys, the driver impersonates a legitimate CrowdStrike Falcon driver, is signed with a revoked certificate from a Chinese company, and is protected using VMProtect.
Elastic, which has dubbed the driver AbyssWorker, has analyzed dozens of samples dating from August 2024 to February 2025. All samples were signed with likely stolen certificates. The driver includes various handlers that rely on kernel APIs to execute malicious activities, and Elastic has even created an implementation example demonstrating how these APIs can be loaded.
“These certificates are widely known and have been shared across multiple malware samples and campaigns, but they are not exclusive to this driver,” Elastic noted.
Elastic’s analysis shows that this driver is not uniquely linked to Medusa ransomware. Previously, it was observed under the name nbwdv.sys, being used in social engineering attacks that resulted in backdoor infections.
To ensure the driver would execute successfully, attackers used a .bat file to disable the Windows Time Service and set the system date back to 2012, bypassing modern security measures that might reject an expired certificate. A controller binary was also used to communicate with the driver.
Elastic’s investigation into AbyssWorker revealed that the driver sets up a self-protection feature upon initialization. It searches for and removes any handles associated with its client process in other processes, ensuring it remains undetected.
Once active, the driver can execute a wide range of operations, including:
- Process manipulation
- File manipulation
- Process tampering
- API loading
- Hook removal
- Driver termination
- System reboot
These capabilities allow the malware to disable security tools permanently, making it a serious threat to infected systems.
Found this article interesting? Follow us on X(Twitter) and Instagram to read more exclusive content we post.