Hackers Advertise VOID AV Killer to Disable Antivirus Tools

Related

High-Severity Bug in Chrome’s Google Gemini AI Panel Could Have Enabled Hijacking

What happened Google patched a high-severity vulnerability (tracked as CVE-2026-0628)...

CISA Warns RESURGE Malware Can Remain Dormant on Ivanti EPMM Devices

What happened The U.S. Cybersecurity and Infrastructure Security Agency (CISA)...

UK Warns of Iranian Cyberattack Risks Amid Middle East Conflict

What happened The UK National Cyber Security Centre (NCSC) issued...

CISOs to Watch in Massachusetts’ Insurance Industry

Massachusetts’ insurance sector includes regional carriers, global specialty insurers,...

Share

What happened

The VOID AV Killer has been advertised by hackers as a tool capable of disabling antivirus and endpoint security software at the kernel level. The tool is marketed as a way to allow malware to run undetected by neutralizing security defenses.

Who is affected

Organizations relying on endpoint protection solutions may face increased risk if such tools are successfully deployed. Disabling security software could enable prolonged attacker access and data compromise.

Why CISOs should care

Kernel-level defense evasion techniques undermine reliance on single-layer endpoint controls. CISOs must assume attackers will attempt to disable security tooling as part of intrusion campaigns.

3 practical actions

  1. Endpoint hardening: Validate protections against unauthorized kernel-level manipulation.
  2. Defense-in-depth: Ensure multiple security controls operate independently of endpoint agents.
  3. SOC readiness: Train analysts to recognize indicators of security tool tampering.