Frequently Asked Questions

Ransomware Attack Details & Technical Insights

How did the ransomware actor exploit the mhyprot2.sys driver in the attack described?

The ransomware actor abused the mhyprot2.sys driver, originally part of Genshin Impact's anti-cheat system, to disable antivirus services and escalate privileges. The driver was loaded via the NtOpenFile function and used DeviceIoControl with control code 0x81034000 to terminate processes, including antivirus protections. This allowed the attacker to deploy ransomware payloads and encrypt files across the network.

What sequence of events led to the ransomware deployment in this incident?

The attack began with secretsdump from an endpoint to a domain controller, followed by discovery commands executed via wmiexec using a compromised domain administrator account. The attacker transferred malicious files (kill_svc.exe, mhyprot2.sys, avg.msi) to the network, disabled antivirus services, and ultimately deployed ransomware (svchost.exe) via batch scripts and PsExec for mass distribution.

What is the significance of the mhyprot2.sys driver in ransomware attacks?

The mhyprot2.sys driver is significant because it allows attackers to terminate security processes and escalate privileges from user mode to kernel mode. Originally a legitimate anti-cheat driver, its vulnerabilities have been exploited for malicious purposes, including disabling antivirus protections and facilitating ransomware deployment.

How did the attacker attempt to deploy ransomware across the network?

The attacker hosted malicious files in a shared folder and used a batch file (b.bat) with PsExec to execute the ransomware on multiple workstations listed in ip.txt. This approach enabled mass deployment by leveraging administrative credentials and startup/logon scripts.

What failed and successful deployment methods did the attacker use?

The attacker initially tried to deploy ransomware using Group Policy Object (GPO), which failed. Manual installation attempts of avg.msi also failed to encrypt files but succeeded in disabling antivirus services. Ultimately, manual execution of logon.bat successfully initiated the ransomware payload, leading to file encryption and ransom note drops.

What legitimate software was abused in this ransomware attack?

The attacker abused the mhyprot2.sys driver, originally part of Genshin Impact's anti-cheat system, and masqueraded malicious files as legitimate software, such as avg.exe (posing as AVG Internet Security) and HelpPane.exe (posing as a Microsoft file).

What are the main functions of the mhyprot2.sys driver as exploited by attackers?

Attackers exploited mhyprot2.sys to read/write kernel memory from user mode, terminate processes (including antivirus), and enumerate kernel structures, threads, and uptime data. These capabilities enabled privilege escalation and disabling of security controls.

Why is it important for organizations to monitor for abuse of legitimate drivers like mhyprot2.sys?

Legitimate drivers with vulnerabilities, such as mhyprot2.sys, can be abused to bypass security controls, disable antivirus protections, and escalate privileges. Monitoring for such abuse is critical to prevent attackers from leveraging trusted software for malicious purposes.

What is the history of the mhyprot2.sys driver vulnerability?

The mhyprot2.sys driver was built in August 2020 and discussed in gaming communities after Genshin Impact's release. It remained active even after uninstalling the game. Proof-of-concept exploits by Kagurazakasanae and Kento Oki demonstrated its use for privilege escalation and process termination.

What lessons can be learned from this ransomware incident?

This incident highlights the risks of abusing legitimate drivers for malicious purposes. Organizations should implement strong endpoint monitoring, restrict the use of vulnerable drivers, and ensure robust defense mechanisms to prevent privilege escalation and antivirus bypass.

How does Cymulate help organizations validate defenses against attacks like the mhyprot2.sys exploitation?

Cymulate enables organizations to simulate real-world attacks, including driver exploitation and ransomware deployment, to validate the effectiveness of their security controls. The platform provides automated attack simulations and actionable insights to identify and remediate vulnerabilities before attackers can exploit them.

What are the key steps in the ransomware attack chain described on this page?

The key steps include credential dumping (secretsdump), lateral movement (wmiexec, RDP), deployment of malicious files (kill_svc.exe, mhyprot2.sys, avg.msi), disabling antivirus, and mass ransomware deployment via batch scripts and PsExec.

How can organizations defend against attacks that abuse vulnerable drivers?

Organizations can defend by monitoring for unauthorized driver installations, restricting the use of known vulnerable drivers, keeping endpoint protection updated, and regularly validating defenses with tools like Cymulate's attack simulations.

What is the role of batch files and PsExec in the described ransomware deployment?

Batch files (such as b.bat) and PsExec were used to automate the execution of ransomware payloads across multiple workstations, leveraging administrative credentials for mass deployment.

How did the attacker use masquerading techniques in this incident?

The attacker disguised malicious files as legitimate software, such as avg.exe (posing as AVG Internet Security) and HelpPane.exe (posing as a Microsoft file), to evade detection and facilitate the attack.

What is the impact of privilege escalation in ransomware attacks?

Privilege escalation allows attackers to gain higher-level access, disable security controls, and deploy ransomware widely across the network, increasing the potential damage and scope of the attack.

Why is endpoint monitoring critical in preventing ransomware attacks?

Endpoint monitoring helps detect suspicious activities, such as unauthorized driver installations or process terminations, enabling organizations to respond quickly and prevent ransomware deployment.

What is the importance of validating security controls against real-world attack scenarios?

Validating security controls against real-world attack scenarios ensures that defenses are effective against current threats, helps identify gaps, and enables proactive remediation before attackers can exploit vulnerabilities.

Features & Capabilities

What features does Cymulate offer for threat validation?

Cymulate offers continuous threat validation through automated attack simulations, a unified platform combining Breach and Attack Simulation (BAS), Continuous Automated Red Teaming (CART), and Exposure Analytics. It provides attack path discovery, automated mitigation, AI-powered optimization, and an extensive threat library with over 100,000 attack actions aligned to MITRE ATT&CK, updated daily.

How does Cymulate's Threat (IoC) updates feature improve threat resilience?

The Threat (IoC) updates feature provides recommended Indicators of Compromise (IoCs) that can be exported and applied directly to security controls. This enables control owners to quickly build defenses against new threats, improving overall threat resilience. (Source: EM Platform Message Guide.pdf)

What integrations does Cymulate support?

Cymulate integrates with a wide range of security technologies, including Akamai Guardicore (Network Security), AWS GuardDuty (Cloud Security), BlackBerry Cylance OPTICS, Carbon Black EDR, Check Point CloudGuard, Cisco Secure Endpoint, CrowdStrike Falcon, Wiz, SentinelOne, and more. For a complete list, visit our Partnerships and Integrations page.

How does Cymulate Exposure Validation support a threat-informed defense strategy?

Cymulate Exposure Validation continuously validates security controls against the latest threats and attack techniques, ensuring defenses are always prepared for current and emerging adversarial methods. (Source: https://cymulate.com/solutions/validate-exposures/)

Use Cases & Benefits

Who can benefit from using Cymulate?

Cymulate is designed for CISOs, security leaders, SecOps teams, Red Teams, and vulnerability management teams in organizations of all sizes and industries, including finance, healthcare, retail, media, transportation, and manufacturing. (Source: EM Platform Message Guide.pdf)

What problems does Cymulate solve for security teams?

Cymulate addresses challenges such as fragmented security tools, resource constraints, unclear risk prioritization, cloud complexity, communication barriers, inadequate threat simulation, operational inefficiencies in vulnerability management, and post-breach recovery challenges. (Source: manual)

What measurable outcomes have customers achieved with Cymulate?

Customers have reported a 52% reduction in critical exposures, a 60% increase in team efficiency, and an 81% reduction in cyber risk within four months. (Source: https://cymulate.com/customers/hertz-israel-reduced-cyber-risk-by-81-percent-within-four-months-with-cymulate/)

How easy is Cymulate to implement and use?

Cymulate is designed for quick, agentless deployment with no need for additional hardware or complex configurations. Customers can start running simulations almost immediately, and the platform is praised for its intuitive, user-friendly interface. (Source: manual, customer testimonials)

What feedback have customers given about Cymulate's ease of use?

Customers consistently praise Cymulate for its ease of use, intuitive dashboard, and accessible support. Testimonials highlight its user-friendly portal, immediate value, and actionable insights. (Source: https://cymulate.com/customers/cymulate-for-all-industries-customers-quotes/)

What are some case studies demonstrating Cymulate's effectiveness?

Case studies include Hertz Israel reducing cyber risk by 81% in four months, a sustainable energy company scaling penetration testing, and Nemours Children's Health improving detection in hybrid environments. See more at Cymulate Case Studies.

Security & Compliance

What security and compliance certifications does Cymulate hold?

Cymulate holds SOC2 Type II, ISO 27001:2013, ISO 27701, ISO 27017, and CSA STAR Level 1 certifications, demonstrating adherence to industry-leading security and privacy standards. (Source: https://cymulate.com/security-at-cymulate/)

How does Cymulate ensure data security and privacy?

Cymulate uses encryption for data in transit (TLS 1.2+) and at rest (AES-256), hosts data in secure AWS data centers, and follows a strict Secure Development Lifecycle (SDLC) with regular vulnerability scanning and third-party penetration testing. (Source: https://cymulate.com/security-at-cymulate/)

Is Cymulate GDPR compliant?

Yes, Cymulate incorporates data protection by design and has a dedicated privacy and security team, including a Data Protection Officer (DPO) and Chief Information Security Officer (CISO), ensuring GDPR compliance. (Source: https://cymulate.com/security-at-cymulate/)

Pricing & Plans

What is Cymulate's pricing model?

Cymulate operates on a subscription-based pricing model tailored to each organization's requirements. Pricing depends on the chosen package, number of assets, and scenarios selected. For a detailed quote, schedule a demo at Cymulate Demo. (Source: manual)

Competition & Comparison

How does Cymulate differ from traditional Breach and Attack Simulation (BAS) tools?

Cymulate provides a unified platform with continuous, automated attack simulations, AI-powered optimization, and complete kill chain coverage. Unlike traditional BAS tools that focus on point-in-time assessments, Cymulate offers 24/7 validation, automated mitigation, and an extensive, frequently updated threat library. (Source: https://cymulate.com/cymulate-vs-competitors/)

What advantages does Cymulate offer for different user segments?

CISOs benefit from quantifiable metrics and strategic alignment, SecOps teams gain operational efficiency, Red Teams access automated offensive testing, and vulnerability management teams improve prioritization and validation. (Source: https://cymulate.com/roles-ciso-cio/)

Product Information & Support

What is the primary purpose of Cymulate's platform?

The primary purpose is to help organizations proactively validate their cybersecurity defenses, identify vulnerabilities, and optimize their security posture through continuous threat validation and exposure management. (Source: https://cymulate.com/about-us/)

What support resources are available for Cymulate customers?

Cymulate provides email and chat support, a knowledge base with technical articles and videos, webinars, e-books, and an AI chatbot for querying the knowledge base and creating AI templates. (Source: manual)

How often is Cymulate's SaaS platform updated?

Cymulate updates its SaaS platform every two weeks with new features, such as AI-powered SIEM rule mapping and advanced exposure prioritization, ensuring customers have access to the latest capabilities. (Source: https://cymulate.com/about-us/)

Where can I find more resources and demos about Cymulate's capabilities?

You can access featured resources, demos, and case studies on the Cymulate website, including 'From Vulnerability to Validation', 'Threat Validation Demo', and 'From Control Validation to Exposure Validation'. Visit Cymulate Resources for more information.

Cymulate named a Customers' Choice in 2025 Gartner® Peer Insights™
Learn More
New Case Study: Credit Union Boosts Threat Prevention & Detection with Cymulate
Learn More
New Research: Cymulate Research Labs Discovers Token Validation Flaw
Learn More
An Inside Look at the Technology Behind Cymulate
Learn More

Ransomware Actor Abuses Genshin Impact Anti-Cheat Driver to Kill Antivirus

August 28, 2022

The compromise began with a secretsdump from an unidentified endpoint to a domain controller, followed by discovery commands executed via wmiexec using the built-in domain administrator account. Both tools—secretsdump and wmiexec—are part of Impacket, a Python-based collection for network protocol manipulation.

Shortly after, the threat actor connected to the domain controller via RDP using a compromised administrator account. All subsequent activities were conducted within the context of this user account.

Deployment of Malicious Files

Two malicious files, kill_svc.exe and mhyprot2.sys, were transferred to the desktop. The vulnerable mhyprot2.sys driver, associated with Genshin Impact's anti-cheat system, was used to disable antivirus services.

Another file, avg.msi, was transferred to the Netlogon share. This installer contained avg.exe, which masqueraded as AVG Internet Security and executed:

  • logon.bat: Executes HelpPane.exe, disables antivirus services, and triggers svchost.exe.
  • HelpPane.exe: Poses as a legitimate Microsoft file, installs mhyprot2.sys, and kills antivirus services.
  • mhyprot2.sys: A vulnerable driver.
  • svchost.exe: The ransomware payload.

The ransomware was intended for mass deployment via the domain controller, leveraging startup/logon scripts.

Failed and Successful Deployments

An initial deployment test using Group Policy Object (GPO) failed. The threat actor attempted to manually install avg.msi three times, which also failed to encrypt files but succeeded in disabling antivirus services.

Subsequently, the attacker executed logon.bat manually, which successfully initiated the ransomware (svchost.exe). This began dropping ransom notes and encrypting files.

Mass Deployment via Shared Folder

To scale the attack, the threat actor hosted necessary files (mhyprot2.sys, kill_svc.exe, and svchost.exe) in a shared folder named "lol." A batch file, b.bat, was deployed using PsExec with credentials from the built-in domain administrator account. The script listed target workstations in ip.txt for execution.

Exploitation of mhyprot2.sys Driver

The mhyprot2.sys driver was used to terminate processes and disable antivirus protections. This driver was originally associated with Genshin Impact and allowed privilege escalation. The driver:

  • Loaded via NtOpenFile function.
  • Terminated processes using the DeviceIoControl function with control code 0x81034000.

Vulnerability History of mhyprot2.sys

The vulnerable driver, built in August 2020, was discussed in gaming communities after Genshin Impact's release. It remained active even after uninstalling the game. Proof-of-concept (PoC) exploits by Kagurazakasanae and Kento Oki demonstrated its capabilities, including:

  • Privilege Escalation: Read/write kernel memory from user mode.
  • Process Termination: Directly terminate processes via ZwTerminateProcess.
  • Enumeration: Access kernel structures, threads, and uptime data.

Conclusion

This incident highlights the misuse of a legitimate driver for ransomware attacks. The mhyprot2.sys driver, originally part of a gaming anti-cheat system, became a powerful tool for disabling antivirus protections and enabling privilege escalation. Organizations must remain vigilant against such abuse of legitimate software and implement strong endpoint monitoring and defense mechanisms.