Researcher Reverse Engineered 0-Day Used to Disable CrowdStrike EDR

In Cybersecurity News - Original News Source is cybersecuritynews.com by Blog Writer

A cybersecurity researcher has uncovered a new Bring Your Own Vulnerable Driver (BYOVD) attack that can turn off top-tier endpoint security solutions, including CrowdStrike Falcon.

By reverse-engineering a previously unknown zero-day kernel driver, the researcher revealed how threat actors use legitimately signed drivers to bypass endpoint detection and response (EDR) systems completely.

In BYOVD attacks, hackers deploy a trusted but flawed driver on a compromised machine to exploit its elevated kernel privileges.

The investigation identified over 15 distinct variants of this malicious driver. Despite their destructive capabilities, all variants carry valid Microsoft digital signatures and have not been blocked or revoked by the vendor.

Alarmingly, scans on platforms like VirusTotal show zero detections from modern antivirus engines.

Because the driver is signed and highly trusted, Windows allows it to load into kernel mode without triggering any security alerts, giving attackers a stealthy foothold.

Reverse Engineering the IOCTL

During technical analysis using IDA Pro, the researcher bypassed an obfuscated entry point to examine the driver’s core device-control handler.

Decompilation failure in DriverEntry(source :core-jmp)

After cleaning up the heavily mangled decompiled code, they discovered a dangerous input/output control (IOCTL) interface. Specifically, the IOCTL code 0x22E010 triggers a dedicated process-killing routine.

The driver accepts a process ID as a string, converts it to an integer using standard C functions, and then executes the termination command. The true danger lies in how the driver terminates security processes from the kernel level.

It uses the ZwOpenProcess and ZwTerminateProcess kernel functions to terminate active applications forcibly.

Creating the POC(source :core-jmp)

In standard user mode, attempting to close a Protected Process Light (PPL) service, such as CrowdStrike, results in an immediate access denial.

However, kernel-level commands bypass these user-mode protections entirely, allowing the driver to silently kill critical security agents before attackers deploy ransomware or other secondary payloads.

To validate the vulnerability, the core-jmp researcher dynamically tracked the driver in a test environment to locate its symbolic link, identified as \.{F8284233–48F4–4680-ADDD-F8284233}.

After running POC(source :core-jmp)

Using this link alongside the discovered IOCTL code, they developed a custom proof-of-concept exploit named PoisonKiller.

When loaded via standard command-line service tools, the exploit successfully targeted and terminated the active CrowdStrike EDR process.

The complete technical analysis and exploit code have been published on GitHub, highlighting a critical blind spot in how modern operating systems handle signed third-party drivers.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.