In this month’s campaign, we’re featuring a spotlight on a BYOVD attack enabled by Paragon vulnerabilities in the BioNTdrv.sys driver.
The Paragon driver BioNTdrv.sys is a kernel-mode driver that is primarily associated with Paragon’s Hard Disk Manager.
Let’s take a closer look.
The BioNTdrv.sys driver is used in operations such as:
NTFS <-> FAT32) Paragon Hard Disk Manager and Partition Manager products, which include the BioNTdrv.sys driver, are widely used by hardware vendors like Western Digital, Toshiba, and ASUS/MSI/Gigabyte.
Recently, Microsoft found a couple of vulnerabilities in the Paragon driver BioNTdrv.sys, which was abused by ransomware groups to get SYSTEM level privileges and essentially disabling security solutions on computer endpoints. This technique is known as BYOVD, short for Bring Your Own Vulnerable Driver.
In general, BYOVD attacks are used to disable EDR and security solutions, which can only be done by the SYSTEM user, bypassing tampering protections and using a more stealth approach rather than stopping the EDR service directly using a command like sc stop.
This means that to execute the attack, the attacker needs one of the following:
SeLoadDriverPrivilege permission. Dropping the malware that will load and eventually exploit the driver, and the driver itself. According to Microsoft the vulnerabilities in the driver are described as:
memmove function, allowing attackers to write to kernel memory and escalate privileges. MasterLrp structure in the input buffer, enabling the execution of arbitrary kernel code. MappedSystemVa pointer before passing it to HalReturnToFirmware, leading to potential compromise of system resources. 
BYOVD is a complex technique. Failing to grasp the complexity can be proven catastrophic. Here’s everything you’ll learn in this spotlight: