Reynolds Ransomware: Disables Security Before Encrypting Data

  • FEBRUARY 23RD, 2026
  • 2min read
Reynolds Ransomware: Disables Security Before Encrypting Data

Reynolds is a ransomware threat identified in early 2026. Its key capability is disabling security tools before encrypting files.

It achieves this by installing a legitimately signed but vulnerable Windows driver. This technique, known as Bring Your Own Vulnerable Driver (BYOVD), grants attackers kernel-level access, allowing them to disable antivirus and endpoint detection systems. Once protections are neutralised, file encryption begins. In 2026, cybersecurity researchers found that the Reynolds ransomware attack embedded a vulnerable BYOVD within its payload to disable EDR tools before encrypting systems.

Simply put: it turns off your protection before locking your data.

Initial Access Methods

Reynolds likely spreads through common ransomware methods:

1. Phishing emails (malicious links or attachments)
2. Stolen or weak passwords (VPN, RDP, admin accounts)
3. Unpatched software vulnerabilities
4. Exposed or misconfigured remote access services

Once attackers gain administrative access, they can install the malicious driver and begin the attack.

Warning Signs

Watch for:
1. Unexpected installation of new system drivers
2. Antivirus or security tools suddenly stopping
3. Multiple systems losing protection simultaneously
4. Sudden spikes in file modifications or encrypted files

Unexplained driver installations should be treated as high-severity security incidents — even if encryption has not yet started.

Recommendations

To reduce risk:

1. Enable the Microsoft Vulnerable Driver Blocklist (or equivalent controls)
2. Restrict driver installation to trusted administrators only
3. Enforce multi-factor authentication (MFA) for remote access
4. Apply least-privilege access principles
5. Keep systems and software fully patched
6. Enable tamper protection in endpoint security tools
7. Maintain offline, regularly tested backups

Backups are critical. If ransomware cannot access backup systems, recovery is significantly faster and less disruptive.

Explore more CIL Advisories

pac4j-jwt Vulnerability: Could Allow Authentication Bypass

pac4j-jwt Vulnerability: Could Allow Authentication Bypass

In modern web applications, JSON Web Tokens (JWTs) act like digital passports. They tell the server who you are and…

MARCH 9TH, 2026

Read More
Critical Patch Management: Closing the Door on Exploits

Critical Patch Management: Closing the Door on Exploits

Unpatched software remains one of the leading causes of enterprise breaches in 2026. Attackers no longer rely solely on zero-day…

MARCH 2ND, 2026

Read More
Device Code Phishing: Abusing Legitimate Microsoft 365 Authentication

Device Code Phishing: Abusing Legitimate Microsoft 365 Authentication

In device code phishing, threat actors exploit the device code authentication flow to capture authentication tokens, which they then use…

FEBRUARY 25TH, 2026

Read More

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Reynolds Ransomware: Disables Security Before Encrypting Data

Contact Us

Message Sent!

Thank you for reaching out. We have received your message and will get back to you shortly.

Check your email for a confirmation from us.

Start a project

Project Request Submitted!

Thank you for your interest. Our team will review your project details and reach out to you soon.

Check your email for a confirmation from us.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .