How a Tax Search Leads to Kernel-Mode AV/EDR Kill
A sophisticated malvertising campaign targets U. S. users searching for tax forms by leveraging Google Ads and cloaking services to evade detection. Victims are redirected to rogue ScreenConnect installers, which deploy a multi-stage crypter that ultimately installs HwAudKiller, a BYOVD tool exploiting a vulnerable Huawei audio driver. HwAudKiller operates in kernel mode to terminate antivirus and EDR processes, effectively disabling endpoint defenses. The attackers use commodity tools such as free-tier ScreenConnect instances and off-the-shelf crypters, combined with a signed but vulnerable driver, to maintain stealth and persistence. Multiple remote access tools are deployed on compromised hosts, indicating preparation for ransomware or initial access brokerage. This threat chain exploits a previously undocumented driver vulnerability, enabling kernel-level AV/EDR evasion without requiring user interaction beyond initial infection. The campaign primarily targets U. S.
AI Analysis
Technical Summary
This threat involves a large-scale malvertising campaign that exploits user interest in U.S. tax forms to deliver a multi-stage attack chain. Initially, attackers use Google Ads combined with dual commercial cloaking services to bypass detection by security tools and ad platforms. Victims clicking on these ads are redirected to malicious websites hosting rogue ScreenConnect installers. ScreenConnect, a legitimate remote access tool, is abused here in its free-tier form to facilitate initial compromise. The installer deploys a multi-stage crypter that obfuscates payloads and ultimately installs HwAudKiller, a Bring Your Own Vulnerable Driver (BYOVD) tool. HwAudKiller exploits a previously undocumented vulnerability in a signed Huawei audio driver, allowing it to execute in kernel mode. This kernel-mode execution enables HwAudKiller to forcibly terminate antivirus and Endpoint Detection and Response (EDR) processes, effectively disabling endpoint defenses without triggering typical user-mode protections. The campaign's sophistication lies in combining commodity tools and services—free ScreenConnect instances, off-the-shelf crypters, and a signed but vulnerable driver—to achieve stealth and persistence. The attackers deploy multiple remote access tools on infected hosts to ensure redundancy and maintain access, suggesting the operation is either a precursor to ransomware deployment or an initial access broker activity. The lack of known CVEs or public exploits indicates this is a zero-day or previously undocumented vulnerability. The campaign leverages tax-related lures during tax season to maximize victim engagement, primarily targeting U.S. users. Indicators of compromise include multiple hashes, domains, and URLs associated with the campaign. The attack chain demonstrates advanced evasion, persistence, and privilege escalation techniques, posing a significant threat to organizations relying on affected endpoint security solutions.
Potential Impact
Organizations worldwide, especially those with U.S.-based operations or users searching for tax-related information, face significant risks from this campaign. The kernel-mode exploitation of a signed Huawei audio driver to terminate AV and EDR processes can lead to complete endpoint security bypass, allowing attackers to maintain stealthy persistence and conduct further malicious activities such as data exfiltration, lateral movement, or ransomware deployment. The use of commodity tools and free-tier services lowers the barrier for attackers, increasing the likelihood of widespread infections. The campaign's redundancy in deploying multiple remote access tools complicates incident response and remediation efforts. Disabling endpoint defenses at the kernel level severely impacts confidentiality, integrity, and availability of organizational assets. The attack also undermines trust in signed drivers and challenges traditional security controls. Given the targeting of tax form searchers, individuals and organizations involved in tax preparation, finance, and accounting are at heightened risk. The campaign's sophisticated evasion techniques may delay detection, increasing dwell time and potential damage. Overall, the threat poses a medium to high risk of operational disruption, data compromise, and financial loss.
Mitigation Recommendations
1. Implement strict application whitelisting and driver integrity checks to prevent loading of unauthorized or vulnerable signed drivers, including the Huawei audio driver exploited by HwAudKiller. 2. Monitor and restrict use of remote access tools like ScreenConnect, especially free-tier or unauthorized instances, and enforce multi-factor authentication and session logging for legitimate remote access. 3. Employ advanced endpoint detection solutions capable of monitoring kernel-mode activities and detecting abnormal process terminations or driver manipulations. 4. Enhance network monitoring to detect and block traffic to known malicious domains and URLs associated with this campaign, leveraging threat intelligence feeds containing the provided indicators. 5. Educate users about malvertising risks and discourage clicking on ads or links related to tax forms from untrusted sources, especially during tax season. 6. Regularly update and patch all drivers and endpoint security software, and engage with vendors to address vulnerabilities in signed drivers. 7. Conduct threat hunting focused on detection of BYOVD techniques and multiple remote access tool deployments to identify compromised hosts early. 8. Implement endpoint isolation and rapid incident response procedures to contain infections before ransomware or further payloads are deployed. 9. Use network segmentation to limit lateral movement from compromised endpoints. 10. Collaborate with ad platforms to report and remove malicious ads and cloaking services used in this campaign.
Affected Countries
United States, Canada, United Kingdom, Australia, Germany, France, Japan, South Korea
Indicators of Compromise
- hash: 8a4033425d36cd99fe23e6faef9764fbf555f362ebdb5b72379342fbbe4c5531
- hash: 0ded1a1eabec8ae0ffb0b512871e7b545878437a
- hash: eef8a950952696b018aa9c6da2f5d7ad
- hash: 1fa071303fb846308571e64727501fb98b1c2be6
- hash: 033f42102362a8d8d4bdba870599eb5e0c893d8fd8dd4bc2a4b446cbbeb59b99
- hash: 0821661e715fe64bb39f4fece277737a48fd6839edd40ec8a4a39bf04cea8524
- hash: 28278b8c85c832417f9860fe8ea3ddbb9ff1d5860317db4813227a3a52b7c7cc
- hash: 2b409a265f571dccde6ef4860831c1b03d5418d1951f97925315dc5b0891da04
- hash: 5abe477517f51d81061d2e69a9adebdcda80d36667d0afabe103fda4802d33db
- hash: 7509365935fc1bfadba20656698d3a29051031635419043bc2bc45116106e026
- url: http://anukitax.com/forminw9/
- url: http://bringetax.com/humu/
- url: http://grinvan.com/vims/browser/
- url: http://rpc.adspect.net/v2/
- url: https://jcibj.com/pcl.php
- domain: anukitax.com
- domain: bjtrck.com
- domain: bringetax.com
- domain: fioclouder.com
- domain: friugrime.com
- domain: grinvan.com
- domain: gripsmonga.sbs
- domain: cdn.justcloakit.com
- domain: client.justcloakit.com
- domain: rpc.adspect.net
How a Tax Search Leads to Kernel-Mode AV/EDR Kill
Description
A sophisticated malvertising campaign targets U. S. users searching for tax forms by leveraging Google Ads and cloaking services to evade detection. Victims are redirected to rogue ScreenConnect installers, which deploy a multi-stage crypter that ultimately installs HwAudKiller, a BYOVD tool exploiting a vulnerable Huawei audio driver. HwAudKiller operates in kernel mode to terminate antivirus and EDR processes, effectively disabling endpoint defenses. The attackers use commodity tools such as free-tier ScreenConnect instances and off-the-shelf crypters, combined with a signed but vulnerable driver, to maintain stealth and persistence. Multiple remote access tools are deployed on compromised hosts, indicating preparation for ransomware or initial access brokerage. This threat chain exploits a previously undocumented driver vulnerability, enabling kernel-level AV/EDR evasion without requiring user interaction beyond initial infection. The campaign primarily targets U. S.
AI-Powered Analysis
Technical Analysis
This threat involves a large-scale malvertising campaign that exploits user interest in U.S. tax forms to deliver a multi-stage attack chain. Initially, attackers use Google Ads combined with dual commercial cloaking services to bypass detection by security tools and ad platforms. Victims clicking on these ads are redirected to malicious websites hosting rogue ScreenConnect installers. ScreenConnect, a legitimate remote access tool, is abused here in its free-tier form to facilitate initial compromise. The installer deploys a multi-stage crypter that obfuscates payloads and ultimately installs HwAudKiller, a Bring Your Own Vulnerable Driver (BYOVD) tool. HwAudKiller exploits a previously undocumented vulnerability in a signed Huawei audio driver, allowing it to execute in kernel mode. This kernel-mode execution enables HwAudKiller to forcibly terminate antivirus and Endpoint Detection and Response (EDR) processes, effectively disabling endpoint defenses without triggering typical user-mode protections. The campaign's sophistication lies in combining commodity tools and services—free ScreenConnect instances, off-the-shelf crypters, and a signed but vulnerable driver—to achieve stealth and persistence. The attackers deploy multiple remote access tools on infected hosts to ensure redundancy and maintain access, suggesting the operation is either a precursor to ransomware deployment or an initial access broker activity. The lack of known CVEs or public exploits indicates this is a zero-day or previously undocumented vulnerability. The campaign leverages tax-related lures during tax season to maximize victim engagement, primarily targeting U.S. users. Indicators of compromise include multiple hashes, domains, and URLs associated with the campaign. The attack chain demonstrates advanced evasion, persistence, and privilege escalation techniques, posing a significant threat to organizations relying on affected endpoint security solutions.
Potential Impact
Organizations worldwide, especially those with U.S.-based operations or users searching for tax-related information, face significant risks from this campaign. The kernel-mode exploitation of a signed Huawei audio driver to terminate AV and EDR processes can lead to complete endpoint security bypass, allowing attackers to maintain stealthy persistence and conduct further malicious activities such as data exfiltration, lateral movement, or ransomware deployment. The use of commodity tools and free-tier services lowers the barrier for attackers, increasing the likelihood of widespread infections. The campaign's redundancy in deploying multiple remote access tools complicates incident response and remediation efforts. Disabling endpoint defenses at the kernel level severely impacts confidentiality, integrity, and availability of organizational assets. The attack also undermines trust in signed drivers and challenges traditional security controls. Given the targeting of tax form searchers, individuals and organizations involved in tax preparation, finance, and accounting are at heightened risk. The campaign's sophisticated evasion techniques may delay detection, increasing dwell time and potential damage. Overall, the threat poses a medium to high risk of operational disruption, data compromise, and financial loss.
Mitigation Recommendations
1. Implement strict application whitelisting and driver integrity checks to prevent loading of unauthorized or vulnerable signed drivers, including the Huawei audio driver exploited by HwAudKiller. 2. Monitor and restrict use of remote access tools like ScreenConnect, especially free-tier or unauthorized instances, and enforce multi-factor authentication and session logging for legitimate remote access. 3. Employ advanced endpoint detection solutions capable of monitoring kernel-mode activities and detecting abnormal process terminations or driver manipulations. 4. Enhance network monitoring to detect and block traffic to known malicious domains and URLs associated with this campaign, leveraging threat intelligence feeds containing the provided indicators. 5. Educate users about malvertising risks and discourage clicking on ads or links related to tax forms from untrusted sources, especially during tax season. 6. Regularly update and patch all drivers and endpoint security software, and engage with vendors to address vulnerabilities in signed drivers. 7. Conduct threat hunting focused on detection of BYOVD techniques and multiple remote access tool deployments to identify compromised hosts early. 8. Implement endpoint isolation and rapid incident response procedures to contain infections before ransomware or further payloads are deployed. 9. Use network segmentation to limit lateral movement from compromised endpoints. 10. Collaborate with ad platforms to report and remove malicious ads and cloaking services used in this campaign.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill"]
- Adversary
- null
- Pulse Id
- 69bc8d909b5c7bee4ed80899
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash8a4033425d36cd99fe23e6faef9764fbf555f362ebdb5b72379342fbbe4c5531 | — | |
hash0ded1a1eabec8ae0ffb0b512871e7b545878437a | — | |
hasheef8a950952696b018aa9c6da2f5d7ad | — | |
hash1fa071303fb846308571e64727501fb98b1c2be6 | — | |
hash033f42102362a8d8d4bdba870599eb5e0c893d8fd8dd4bc2a4b446cbbeb59b99 | — | |
hash0821661e715fe64bb39f4fece277737a48fd6839edd40ec8a4a39bf04cea8524 | — | |
hash28278b8c85c832417f9860fe8ea3ddbb9ff1d5860317db4813227a3a52b7c7cc | — | |
hash2b409a265f571dccde6ef4860831c1b03d5418d1951f97925315dc5b0891da04 | — | |
hash5abe477517f51d81061d2e69a9adebdcda80d36667d0afabe103fda4802d33db | — | |
hash7509365935fc1bfadba20656698d3a29051031635419043bc2bc45116106e026 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://anukitax.com/forminw9/ | — | |
urlhttp://bringetax.com/humu/ | — | |
urlhttp://grinvan.com/vims/browser/ | — | |
urlhttp://rpc.adspect.net/v2/ | — | |
urlhttps://jcibj.com/pcl.php | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainanukitax.com | — | |
domainbjtrck.com | — | |
domainbringetax.com | — | |
domainfioclouder.com | — | |
domainfriugrime.com | — | |
domaingrinvan.com | — | |
domaingripsmonga.sbs | — | |
domaincdn.justcloakit.com | — | |
domainclient.justcloakit.com | — | |
domainrpc.adspect.net | — |
Threat ID: 69bd007ce32a4fbe5f3ee31a
Added to database: 3/20/2026, 8:08:28 AM
Last enriched: 3/20/2026, 8:23:42 AM
Last updated: 3/20/2026, 3:00:30 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.