Tax-Themed Google Ads Lead to BYOVD EDR Killer Attacks

Related

Female Cybersecurity Leaders to Watch in Arizona

Arizona’s cybersecurity leadership landscape continues to expand alongside its...

New Data Leak Site Uncovered Linked to Active Initial Access Broker

What happened Researchers uncovered a new Tor-based data leak site...

Trio-Tech Discloses Ransomware Attack Impacting Semiconductor Operations

What happened Trio-Tech International disclosed a ransomware attack affecting its...

Kaplan Data Breach Notification Follows Hack Exposing Personal Information

What happened Kaplan North America began notifying individuals of a...

Female Cybersecurity Leaders to Watch in Virginia

Virginia’s cybersecurity bench is shaped by a rare mix...

Share

What happened

A new campaign is using tax-themed Google Ads to lure users into downloading malicious files that deploy a Bring Your Own Vulnerable Driver (BYOVD) technique to disable endpoint detection and response (EDR) protections. Victims searching for tax-related tools are redirected to fake websites that deliver malware capable of installing vulnerable drivers, which are then abused to terminate security processes and evade detection. The attack chain ultimately allows threat actors to execute payloads on compromised systems without interference from security software, making the infections more difficult to detect and remediate.

Who is affected

Users searching for tax-related services or software via Google Ads are affected, particularly those who download tools from spoofed websites promoted through sponsored results.

Why CISOs should care

The campaign shows how attackers are combining search engine advertising abuse with BYOVD techniques to bypass security controls and execute malware in protected environments.

3 practical actions

  1. Restrict downloads from sponsored links. Treat software delivered via Google Ads with caution and verify sources before installation.
  2. Monitor for vulnerable driver abuse. Detect unauthorized driver installations and abnormal termination of security tools.
  3. Harden endpoint protections. Implement controls to block or alert on known vulnerable drivers used in BYOVD attacks.

For more coverage of malicious software and evolving attack techniques, explore our reporting under the Malware tag.