5 min read

LOLDrivers and HVCI

Understanding the relationship between LOLDrivers and Hypervisor-Protected Code Integrity (HVCI) - how they work together to protect against driver-based attacks.

loldrivers hvci byovd drivers windows-security

Originally published on Medium
Read the full article: LOLDrivers and HVCI

What is HVCI?

Hypervisor-Protected Code Integrity (HVCI) uses virtualization-based security to protect the Windows kernel from malicious code. It’s a powerful defense against BYOVD attacks.

How HVCI Helps

HVCI prevents:

  • Loading unsigned drivers
  • Driver code modifications
  • Certain kernel exploits

The LOLDrivers Connection

Even with HVCI, defenders need LOLDrivers because:

Signed Drivers Still Load

HVCI blocks unsigned drivers. Vulnerable drivers with valid signatures still load.

Blocklist Maintenance

Microsoft’s driver blocklist needs continuous updates. LOLDrivers helps identify what should be blocked.

Detection Still Needed

HVCI is preventive. You still need detection for:

  • Attempts to load vulnerable drivers
  • Exploitation of loaded drivers
  • Pre-HVCI systems

Defense in Depth

Best protection combines:

  1. HVCI - Prevent unsigned drivers
  2. Driver Blocklist - Block known-bad signed drivers
  3. LOLDrivers Detection - Alert on vulnerable driver activity
  4. Monitoring - Track driver loads and behavior

Recommendations

  • Enable HVCI where possible
  • Keep driver blocklist updated
  • Implement LOLDrivers detections
  • Monitor Sysmon Event ID 6

Read the full analysis: LOLDrivers and HVCI

Related Modules

Active

LOLDrivers

Living Off The Land Drivers - A curated list of Windows drivers used by adversaries to bypass security controls. The definitive resource for vulnerable driver detection.

drivers byovd detection windows +2