New DLL Hijacking Variant Sidesteps Windows Security
The cybersecurity landscape is riddled with cunning threat actors continuously fine-tuning their tactics and leveling up their attacking maneuvers. A novel variant of a well-known cybersecurity threat has managed to evade the protective measures of both Windows 10 and Windows 11. This new variant, perniciously innovative, exploits the renowned dynamic link library (DLL) search order hijacking technique. By leveraging key executables housed in the trusted WinSxS folder, the infiltrating threat can execute malicious code, bypass the need for elevated access, and introduce potentially hazardous binaries into the cyber attack chain.
DLL search order hijacking is a crafty technique employed by malicious entities to manipulate the DLL loading sequence and execute harmful payloads. It actively substitutes authentic system binaries with DLL replicates in non-standard directories, paving the way for hijacking. When the process initiates, it prioritizes the directory from which it is executing, hence picking up the malicious DLL over the legitimate one.
The updated variant has set its sights on the trusted “C:\Windows\WinSxS” folder. This folder is vital for updating and customizing the operating system, maintaining compatibility and integrity. Hackers can achieve code execution by placing a custom DLL with the same name as a vulnerable binary in the WinSxS folder and executing the file from the custom directory.
The cybersecurity firm Security Joes, who unearthed this variant, counsels organizations to scrutinize parent-child relationships between processes, supervise the activities of binaries in the WinSxS folder, and establish robust precautions to stave off exploitation. Armed with this knowledge, robust security measures, and IT hygiene best practices, organizations can prepare their defense against this new cybersecurity threat.
DLL search order hijacking, especially its new variant, underscores the ever-evolving threat landscape and the necessity for organizations to stay abreast of new attack methodologies. Informed, timely action and persistent vigilance can form the bulwark against these invasive cybersecurity threats.
If you enjoyed this article, please check out our other articles on CyberNow