5 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Researchers have identified a new ransomware called Reynolds that includes a built-in component to exploit a vulnerable driver for evading security measures. This tactic, known as bring your own vulnerable driver (BYOVD), allows the ransomware to disable security programs and operate undetected. The attack also involved a suspicious loader and remote access tools for persistent control over compromised systems.
If you do, here's more
The emergence of the Reynolds ransomware family highlights a concerning trend in cybersecurity. It incorporates a bring your own vulnerable driver (BYOVD) mechanism, allowing attackers to disable security solutions directly from the ransomware payload. This approach uses a flawed NsecSoft NSecKrnl driver, which can terminate processes of various security programs like Avast, CrowdStrike Falcon, and Symantec Endpoint Protection. Notably, the driver has a known vulnerability (CVE-2025-68947, CVSS score: 5.7) that threat actors can exploit to manipulate security tools.
Cybersecurity teams from Symantec and Carbon Black pointed out that bundling the BYOVD component with ransomware makes it harder for defenders to respond effectively. This tactic isn't new; it was previously seen in attacks involving Ryuk in 2020 and Obscura in 2025. The Reynolds campaign also featured a suspicious loader on the target network weeks before the ransomware deployment, suggesting a well-planned strategy for maintaining access. Following the ransomware attack, the GotoHTTP remote access program was deployed, indicating the attackers' intent to retain control over the compromised systems.
Recent ransomware trends show a shift in tactics among various groups. For example, the GLOBAL GROUP ransomware has been linked to high-volume phishing campaigns, while WantToCry has exploited legitimate virtual machines for malicious payloads. The LockBit group's latest version, LockBit 5.0, has introduced new encryption techniques and features that enhance its stealth. Overall, the landscape is evolving, with a total of 4,737 ransomware attacks recorded in 2025, up from 4,701 the previous year, alongside a 23% increase in data theft incidents. The average ransom payment reached $591,988 in Q4 2025, marking a significant rise from previous quarters.
Questions about this article
No questions yet.