Hackers are using a legitimate Avast Anti-Rootkit driver to disguise their malware and turn off antivirus protection.
The malware belongs to the AV Killer family and uses a vector known as bring-your-own-vulnerable-driver (BYOVD) to infect systems.
The malware places a vulnerable driver named 'ntfs.bin' into the default Windows user folder and uses the 'aswArPot.sys' service to register the driver.
The malware includes a hardcoded list of processes used by common security products and uses the 'DeviceIoControl' API to end the process, disabling antivirus detection.