Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

How a Tax Search Leads to Kernel-Mode AV/EDR Kill

0
Medium
Published: Thu Mar 19 2026 (03/19/2026, 23:58:08 UTC)
Source: AlienVault OTX General

Description

A sophisticated malvertising campaign targets U. S. users searching for tax forms by leveraging Google Ads and cloaking services to evade detection. Victims are redirected to rogue ScreenConnect installers, which deploy a multi-stage crypter that ultimately installs HwAudKiller, a BYOVD tool exploiting a vulnerable Huawei audio driver. HwAudKiller operates in kernel mode to terminate antivirus and EDR processes, effectively disabling endpoint defenses. The attackers use commodity tools such as free-tier ScreenConnect instances and off-the-shelf crypters, combined with a signed but vulnerable driver, to maintain stealth and persistence. Multiple remote access tools are deployed on compromised hosts, indicating preparation for ransomware or initial access brokerage. This threat chain exploits a previously undocumented driver vulnerability, enabling kernel-level AV/EDR evasion without requiring user interaction beyond initial infection. The campaign primarily targets U. S.

AI-Powered Analysis

AILast updated: 03/20/2026, 08:23:42 UTC

Technical Analysis

This threat involves a large-scale malvertising campaign that exploits user interest in U.S. tax forms to deliver a multi-stage attack chain. Initially, attackers use Google Ads combined with dual commercial cloaking services to bypass detection by security tools and ad platforms. Victims clicking on these ads are redirected to malicious websites hosting rogue ScreenConnect installers. ScreenConnect, a legitimate remote access tool, is abused here in its free-tier form to facilitate initial compromise. The installer deploys a multi-stage crypter that obfuscates payloads and ultimately installs HwAudKiller, a Bring Your Own Vulnerable Driver (BYOVD) tool. HwAudKiller exploits a previously undocumented vulnerability in a signed Huawei audio driver, allowing it to execute in kernel mode. This kernel-mode execution enables HwAudKiller to forcibly terminate antivirus and Endpoint Detection and Response (EDR) processes, effectively disabling endpoint defenses without triggering typical user-mode protections. The campaign's sophistication lies in combining commodity tools and services—free ScreenConnect instances, off-the-shelf crypters, and a signed but vulnerable driver—to achieve stealth and persistence. The attackers deploy multiple remote access tools on infected hosts to ensure redundancy and maintain access, suggesting the operation is either a precursor to ransomware deployment or an initial access broker activity. The lack of known CVEs or public exploits indicates this is a zero-day or previously undocumented vulnerability. The campaign leverages tax-related lures during tax season to maximize victim engagement, primarily targeting U.S. users. Indicators of compromise include multiple hashes, domains, and URLs associated with the campaign. The attack chain demonstrates advanced evasion, persistence, and privilege escalation techniques, posing a significant threat to organizations relying on affected endpoint security solutions.

Potential Impact

Organizations worldwide, especially those with U.S.-based operations or users searching for tax-related information, face significant risks from this campaign. The kernel-mode exploitation of a signed Huawei audio driver to terminate AV and EDR processes can lead to complete endpoint security bypass, allowing attackers to maintain stealthy persistence and conduct further malicious activities such as data exfiltration, lateral movement, or ransomware deployment. The use of commodity tools and free-tier services lowers the barrier for attackers, increasing the likelihood of widespread infections. The campaign's redundancy in deploying multiple remote access tools complicates incident response and remediation efforts. Disabling endpoint defenses at the kernel level severely impacts confidentiality, integrity, and availability of organizational assets. The attack also undermines trust in signed drivers and challenges traditional security controls. Given the targeting of tax form searchers, individuals and organizations involved in tax preparation, finance, and accounting are at heightened risk. The campaign's sophisticated evasion techniques may delay detection, increasing dwell time and potential damage. Overall, the threat poses a medium to high risk of operational disruption, data compromise, and financial loss.

Mitigation Recommendations

1. Implement strict application whitelisting and driver integrity checks to prevent loading of unauthorized or vulnerable signed drivers, including the Huawei audio driver exploited by HwAudKiller. 2. Monitor and restrict use of remote access tools like ScreenConnect, especially free-tier or unauthorized instances, and enforce multi-factor authentication and session logging for legitimate remote access. 3. Employ advanced endpoint detection solutions capable of monitoring kernel-mode activities and detecting abnormal process terminations or driver manipulations. 4. Enhance network monitoring to detect and block traffic to known malicious domains and URLs associated with this campaign, leveraging threat intelligence feeds containing the provided indicators. 5. Educate users about malvertising risks and discourage clicking on ads or links related to tax forms from untrusted sources, especially during tax season. 6. Regularly update and patch all drivers and endpoint security software, and engage with vendors to address vulnerabilities in signed drivers. 7. Conduct threat hunting focused on detection of BYOVD techniques and multiple remote access tool deployments to identify compromised hosts early. 8. Implement endpoint isolation and rapid incident response procedures to contain infections before ransomware or further payloads are deployed. 9. Use network segmentation to limit lateral movement from compromised endpoints. 10. Collaborate with ad platforms to report and remove malicious ads and cloaking services used in this campaign.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.huntress.com/blog/w2-malvertising-to-kernel-mode-edr-kill"]
Adversary
null
Pulse Id
69bc8d909b5c7bee4ed80899
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash8a4033425d36cd99fe23e6faef9764fbf555f362ebdb5b72379342fbbe4c5531
hash0ded1a1eabec8ae0ffb0b512871e7b545878437a
hasheef8a950952696b018aa9c6da2f5d7ad
hash1fa071303fb846308571e64727501fb98b1c2be6
hash033f42102362a8d8d4bdba870599eb5e0c893d8fd8dd4bc2a4b446cbbeb59b99
hash0821661e715fe64bb39f4fece277737a48fd6839edd40ec8a4a39bf04cea8524
hash28278b8c85c832417f9860fe8ea3ddbb9ff1d5860317db4813227a3a52b7c7cc
hash2b409a265f571dccde6ef4860831c1b03d5418d1951f97925315dc5b0891da04
hash5abe477517f51d81061d2e69a9adebdcda80d36667d0afabe103fda4802d33db
hash7509365935fc1bfadba20656698d3a29051031635419043bc2bc45116106e026

Url

ValueDescriptionCopy
urlhttp://anukitax.com/forminw9/
urlhttp://bringetax.com/humu/
urlhttp://grinvan.com/vims/browser/
urlhttp://rpc.adspect.net/v2/
urlhttps://jcibj.com/pcl.php

Domain

ValueDescriptionCopy
domainanukitax.com
domainbjtrck.com
domainbringetax.com
domainfioclouder.com
domainfriugrime.com
domaingrinvan.com
domaingripsmonga.sbs
domaincdn.justcloakit.com
domainclient.justcloakit.com
domainrpc.adspect.net

Threat ID: 69bd007ce32a4fbe5f3ee31a

Added to database: 3/20/2026, 8:08:28 AM

Last enriched: 3/20/2026, 8:23:42 AM

Last updated: 3/20/2026, 3:00:30 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses