New DLL Hijacking Technique Let Attackers Bypass Windows Security Mechanisms

DLL hijacking is a technique where a malicious DLL (Dynamic Link Library) is placed in a directory that a vulnerable application searches before the legitimate one.  When the application is launched, it unknowingly loads the malicious DLL instead, allowing attackers to:- Execute arbitrary code Compromise the system Recently, the cybersecurity researchers at a multi-layered incident response company, Security Joes, discovered a new DLL hijacking technique that enables threat actors to bypass Windows mechanisms. New DLL Hijacking Technique This new technique exploits trusted WinSxS executables using DLL Search Order Hijacking.  This enables threat actors to execute malicious code within Windows folders, which eliminates the need for extra binaries.  Besides this, it’s compatible with both Windows 10 and 11, as it bypasses high privilege requirements.

Source: GBHackers

 


Date:

Categorie(s):