Technical Analysis & Remediation
Attack Vector & Mechanism
Unlike previous campaigns where tools like AuKill or Poortry were dropped separately, the vulnerable driver (402.sys) is bundled inside the main ransomware executable. Upon execution, the payload drops the driver, establishes the NSecKrnl service, and issues IOCTL requests to terminate specific security processes.
MITRE ATT&CK Mapping
T1562.001 (Impair Defenses: Disable or Modify Tools) Abusing vulnerable drivers to kill AV/EDR.
T1068 (Exploitation for Privilege Escalation) Leveraging CVE-2025-68947 to gain SYSTEM/Kernel access.
T1574.002 (Hijack Execution Flow: DLL Side-Loading) Use of vspmsg.dll loader.
T1219 (Remote Access Software)
Deployment of GotoHTTP for persistence.
CVE Profile
ID
CVE-2025-68947
Component
NsecSoft NSecKrnl Driver
Vector
Local, Authenticated.
Impact
Arbitrary process termination (including Protected Processes) via crafted IOCTLs due to insufficient permission verification.
Live Evidence Extraction (Anchors)
Targeted Processes (Partial List)
"Sophos UI.exe", "CSFalconService.exe", "MsMpEng.exe", "CarbonBlackClient.exe" (implied by context), "ekrn.exe", "AvastUI.exe".
Ransomware Extension
Files are appended with .locked.
Persistence Tool
gotohttp.exe found post-encryption.
Indicators of Compromise (IOCs)
Ransomware (Black Basta) 6bd8a0291b268d32422139387864f15924e1db05dbef8cc75a6677f8263fa11d
Vulnerable Driver (402.sys) 206f27ae820783b7755bca89f83a0fe096dbb510018dd65b63fc80bd20c03261
Loader (vspmsg.dll) bf6686858109d695ccdabce78c873d07fa740f025c45241b0122cecbdd76b54e
Webshell e09686fde44ae5a804d9546105ebf5d2832917df25d6888aefa36a1769fe4eb4
Remote Access (GotoHTTP) 230b84398e873938bbcc7e4a1a358bde4345385d58eb45c1726cee22028026e9
Remediation - THE ENTERPRISE TRACK (SANS PICERL)
Phase 1: Identification & Containment
Hunt for Driver Load Events
Query SIEM/EDR for the loading of 402.sys or the creation of the NSecKrnl service.
Isolate Infected Hosts
Immediately sever network connections for any host exhibiting IOCTL calls to the NsecSoft driver or creating files with the .locked extension.
Block Hash Indicators
Push the IOCs listed above to all perimeter firewalls and endpoint blocklists immediately.
Phase 2: Eradication
Root Cause Analysis
Investigate the vspmsg.dll loader to determine the initial entry vector (likely phishing or exploited edge services).
Neutralize Persistence
Remove the GotoHTTP tool and any scheduled tasks associated with the ransomware or the xxxxx.aspx webshell found in the environment.
Driver Pruning
Ensure the malicious 402.sys driver is deleted and the associated service registry keys are removed.
Phase 3: Recovery
Validation
Verify EDR agents are fully functional and "checking in" after the driver is removed. The ransomware attempts to kill "SophosHealth.exe", "SmcGui.exe", "cyserver.exe", etc..
Restoration
Reimage compromised hosts. Do not attempt to decrypt without a valid key; restoration from offline/immutable backups is the only guaranteed recovery method.
Phase 4: Lessons Learned
Driver Blocklist Enforcement
This attack succeeds because the driver is signed. Implement the Microsoft Vulnerable Driver Blocklist (HVCI) via Group Policy to prevent known vulnerable drivers from loading.
EDR Tamper Protection
Review EDR configurations to ensure "Tamper Protection" is set to the highest level, though kernel-level BYOVD attacks can sometimes bypass user-mode protections.
Remediation - THE HOME USER TRACK
Priority 1: Safety & Isolation
Disconnect Immediately
If you suspect infection (files renamed to .locked), unplug the ethernet cable or disable Wi-Fi to prevent spread to shared drives or cloud sync folders.
Offline Scanning
Use a rescue disk (e.g., Microsoft Defender Offline) to scan the system without loading the operating system, preventing the ransomware driver from loading.
Priority 2: Identity
Credential Reset
If GotoHTTP was present, assume the attacker had remote access. Reset all passwords (email, banking) from a clean device.
Priority 3: Persistence Removal
Check Installed Programs
Look for "GotoHTTP" or unknown remote desktop tools and uninstall them.
System Restore
If backups are unavailable, a full Windows reinstall is recommended over attempting to clean a compromised system.
Hardening & References
Baseline
CIS Benchmark for Windows Server 2025 (ensure "User Rights Assignment" prevents unauthorized driver loading).
Tactical
Microsoft HVCI (Hypervisor-Protected Code Integrity). Enabling Memory Integrity in Windows Security settings blocks many BYOVD attacks by verifying driver compatibility and signatures against a deny list.
Reference
Primary Report (Security.com)