Reynolds Ransomware BYOVD Eludes EDR Tools

the exploit blog logo
The Exploit: Penetration Testing Insights From The Frontlines
Posted on February 20, 2026
Reynolds Ransomware BYOVD Eludes EDR Tools

Written by Nathan Anderson

Ransomware continuously evolves, presenting new challenges for both individuals and organizations. A recent development is the emergence of a sophisticated ransomware named Reynolds, which stands out due to its advanced defense evasion tactics.

Bring Your Own Vulnerable Driver – BYOVD

Reynolds introduces a unique mechanism known as Bring Your Own Vulnerable Driver (BYOVD). Reynolds incorporates an evasion technique directly into its payload, making it highly elusive to security measures such as EDR (Endpoint Detection and Response) tools. BYOVD works by exploiting legitimate but flawed software components, allowing the ransomware to hide its malicious activities and bypass detection mechanisms effectively.

In the case of Reynolds, instead of deploying separate tools beforehand to disable security measures, the malicious driver is bundled within the ransomware itself. Upon execution, Reynolds drops an NsecSoft NSecKrnl driver, exploiting known vulnerabilities (CVE-2025-68947) to terminate processes of various security programs, effectively evading detection and response mechanisms. The NSecKrnl driver, while legitimate, is fraught with a critical vulnerability that enables attackers to terminate arbitrary processes.

The integration of BYOVD within the ransomware payload poses significant challenges for defenders. By bundling defense evasion capabilities, attackers reduce the noise typically associated with deploying separate tools, making it harder for security systems to detect and respond in time. This tactic not only enhances the effectiveness of the attack but also streamlines the process for affiliates, who no longer need to incorporate additional steps into their operations.

Ransomware Trends

This type of cyber threat demonstrates that attackers are continuously seeking new ways to evade security systems, making it harder for antivirus software and other security measures to detect and neutralize these threats efficiently.

Beyond Reynolds, 2025 saw broader trends in ransomware evolution, with both emerging groups, such as GLOBAL GROUP and Devman, and established entities like LockBit adapting their methods. For instance, LockBit’s updated version incorporates advanced encryption techniques and malicious features, underscoring the dynamic nature of cybercrime.

Reynolds demonstrates the need for organizations to put preemptive measures in place, including penetration tests, vulnerability management, and patch management. 

Nathan Anderson

Nathan Anderson

Nathan has been working in Information Technology and Cybersecurity for nine years and has competed in several Capture The Flag (CTFs) events. He holds the Offensive Security Certified Professional (OSCP) certification and, for the past five years, has enjoyed using his skills in the Penetration Testing and Network Security realms. In his off time, when he’s not taking part in a CTF, security research, or working on a new IoT project, he enjoys building furniture and hiking.

Search The Exploit Blog

Stay up to date with the latest in penetration testing

Name(Required)
Newsletter(Required)
Do you wish to join our newsletter? We send out emails once a month that cover the latest in cybersecurity news. We do not sell your information to other parties.