New malware uses the confidence Windows pilots to get around security systems – here is how to stay safe


  • The Chinese threat group has abused a vulnerable anti-antigalon pilot to deactivate antivirus and EDR tools
  • The attackers also operated a Zemana (ZAM.EXE) anti-Malware pilot for wider compatibility through Windows
  • Researchers urge computer teams to update lists, use Yara rules and monitor suspicious activity

Silver Fox Chinese pirates have been seen abusing a Windows driver before reliable to deactivate antivirus protections and deploy malware on target devices.

The last driver to be mistreated in the secular attack “Bring Your Own Vulnerable Driver” is called the Antimalware of Guard De Garde, generally part of the safety solution of the same name.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top