Reynolds Ransomware: BYOVD Evasion & NSecKrnl Abuse

Reynolds Ransomware: BYOVD Evasion & NSecKrnl Abuse

Why this matters?

A new ransomware group tracked as “Reynolds” emerged in February 2026 and is reported to use Bring Your Own Vulnerable Driver (BYOVD) technique to disable security controls before encryption, thereby significantly increasing its chances of success even in well-equipped environments.

What to expect if this hits you?

  • Security tooling disruption (EDR/AV termination) prior to encryption via a vulnerable Kernel driver.
  • Encryption + pressure tactics (leak-site negotiation), with a clear victim communication path via Tox/onion
  • Operational impact: reduced visibility at the worst possible time (pre-encryption window).

What we know about Reynolds?

Observed targeting:

  • There is currently one known victim of the Reynolds Ransomware Group.
    • Victim: falconmgt.com
    • Victim’s Sector: Business Services
    • Discovered on 2026-02-11
    • Estimated attack date of 2025-11-13
  • The Reynolds Ransomware Group publishes its victims via a Tor onion address.

Known highlighted tactics:

  • BYOVD (Build Your Own Vulnerable Driver) uses the NSecKrnl driver to terminate security products/evade detection.
  • Our findings attribute this to CVE-2025-68947 in the NSecKrnl driver.
  • Encrypted files with the “.locked” extension have been observed.
  • Observed techniques include the use of the GotoHTTP remote access tool.

Technical Summary

Execution Chain:

  • Privilege & driver load:  activity consistent with enabling/loading a Kernel driver (requires SeLoadDriverPrivilege).
  • Driver-based tampering (BYOVD): vulnerable driver used to terminate/neutralize security processes.
  •  Encryption + artifacts: files renamed with an added extension and ransom note dropped.
  • Victim communications: ransom note points to a Tor onion site and a Tox ID.

IR Priorities (what to do first?)

  • Containment: isolate affected hosts quickly (driver-based EDR tampering may reduce telemetry).
  • Driver abuse hunting: look for new/unknown driver installs, service creation and suspicious “ImagePath” pointing into user-writable locations:
  • Validate backups & recovery: expect “fast-impact” behavior once security is degraded.

What CISOs should ask their teams?

  • Are we enforcing driver block controls (e.g., WDAC / vulnerable driver block lists / HVCI where feasible) ?
  • Are we receiving alerts regarding service creation for drivers and registry changes under SYSTEM\ControlSet\Services\* ?
  • If EDER fails, do we have “emergency” visibility (off-band logging, network telemetry, immutable backups) ?
Brandefense CTI protection against Reynolds ransomware and BYOVD-based evasion techniques
Detect Reynolds targeting before encryption starts.

Technical Indicators (Hashes/IOCs/Detection References)

Sample Hashes

Primary Sample:

MD5f7d7377b17fc4cdcbb783cc090d6e983
SHA103fe81be332f81a0fc590961109e7e2e8c9ad4fa
SHA2565100e19d229de04b5028cc0c00bfa9f5904b0a5f0e1ae49828580d0973548ac5


Dropped Ransom Note:

File Path ObservedC:\Recovery\WindowsRE\___RestoreYourFiles___.txt
MD5d04b68674d2cebb154a0fca7013260a1
SHA256f7a4cfdd1c855a9f399661cfae39ca0c9cf23ae66a97e14a2063f61a2c3a0806

File / Registry IOCs

Driver-related

  • Driver file path observed in registry: \??\C:\ProgramData\402.sys
  • Service key: \REGISTRY\MACHINE\SYSTEM\CONTROLSET001\SERVICES\NSecKrnl\ImagePath → \??\C:\ProgramData\402.sys

Ransom note filename:

  • ___RestoreYourFiles___.txt

Processes

C:\Users\Admin\AppData\Local\Temp\6bd8a0291b268d32422139387864f15924e1db05dbef8cc75a6677f8263fa11d.exe                             PID:3348


“C:\Users\Admin\AppData\Local\Temp\6bd8a0291b268d32422139387864f15924e1db05dbef8cc75a6677f8263fa11d.exe”

Sets service image path in registry
Drops startup file
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: LoadsDriver
Suspicious use of AdjustPrivilegeToken

————


C:\Windows\system32\svchost.exe                   PID:3612

C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc

C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe                             PID:2592

“C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe” -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca

———-

Downloads

C:\Recovery\WindowsRE\___RestoreYourFiles___.txt

Filesize812B
MD5554da156863a1e3eb6c4d511e6bb8844
SHA11f25bc43a002700b2183b7cf06d3ea8f4f710193
SHA256c3bca7c9e5b0d3d9dadcae78ca79ee687c8f93d3e59500e86f03685d9ee4db70
SHA512952011d94feb09d3ae5c7bd876acc50f93d23090c4e6a2c982872a5e95c7d83

C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

Filesize15KB
MD5ca9815189bc1630cd67d7d825bb4011c
SHA153f46cd7c4f0520b0a816406a5e1bd8208e08501
SHA256fe841fe36933b3fc54c75a7ee1065af796a927f97e30c5c343203432cd4bf953
SHA51276616328285fc1c26d4a744dcbf9b3b020792442112d7cebfe7560ca59cc517dc91d2ff5fda8bed70207f94b7eb4bd319ce72f7dba05f77394a6e3dd2295c3d7

Ransom Note

brandefense.io new ransomware group reynolds targets byovd enabled evasion image Brandefense

Yara Rule

/*

  Brandefense

  Reynolds (Feb 2026) - Ransom note + ransomware/BYOVD

*/

import "pe"

rule RANSOM_Reynolds_RansomNote___RestoreYourFiles___Feb2026

{

  meta:

    author = "Brandefense"

    description = "Detects Reynolds ransom note (___RestoreYourFiles___.txt) with qTox poison ID and onion portal"

    date = "2026-02-18"

  strings:

    $s1 = "All your important files have been encrypted!" ascii nocase

    $s2 = "You have 3 days to contact us for negotiation." ascii nocase

    $s3 = "Contact our qtox." ascii nocase

    $s4 = "Our poison ID:" ascii nocase

    $s5 = "Note that this server is available via Tor browser only" ascii nocase

    $tox = "6F7831EBB5EEB933275BD6F4B4AA888918E9B7E40454A477CADDE7EE02461153D3B77AE50798" ascii

    $onion = "bs2tlg32pfjwmclm22cyngqmoo24cdlhfxzbruwrdaxumisfeory32qd.onion" ascii

    $fname = "___RestoreYourFiles___" ascii

  condition:

    filesize < 50KB and

    $tox and $onion and

    2 of ($s1,$s2,$s3,$s4,$s5,$fname)

}

rule Reynolds_Ransomware_BYOVD_NSecKrnl_Feb2026

{

  meta:

    author = "Brandefense"

    description = "Detection Rule for Reynolds ransomware family with bundled BYOVD/NSecKrnl activity and ransom-note artifacts"

    date = "2026-02-18"

  strings:

    /* BYOVD / driver-load related artifacts (observed behavior) */

    $reg_service = "\\REGISTRY\\MACHINE\\SYSTEM\\ControlSet001\\Services\\NSecKrnl\\ImagePath" ascii wide

    $svc_name    = "NSecKrnl" ascii wide

    $driver_path = "\\??\\C:\\ProgramData\\402.sys" ascii wide

    $priv        = "SeLoadDriverPrivilege" ascii wide

    /* Ransom-note payload artifacts (often embedded for drop) */

    $note_name = "___RestoreYourFiles___" ascii wide

    $note_line = "All your important files have been encrypted!" ascii nocase

    $tox = "6F7831EBB5EEB933275BD6F4B4AA888918E9B7E40454A477CADDE7EE02461153D3B77AE50798" ascii

    $onion = "bs2tlg32pfjwmclm22cyngqmoo24cdlhfxzbruwrdaxumisfeory32qd.onion" ascii

  condition:

    uint16(0) == 0x5A4D and pe.is_pe and pe.is_64bit() and

    (

      /* strong BYOVD signal */

      2 of ($reg_service,$svc_name,$driver_path,$priv)

    ) and

    (

      /* tie-back to Reynolds note/portal */

      $note_name or $note_line or ($tox and $onion)

    )

}

Brandefense Ransomware Trends Report Q4 2025 with sector-specific ransomware analysis and global impact insights
Sector-specific ransomware intelligence and global threat insights.

Share This: