Wednesday, 3 December 2025
30.4 C
Singapore
30.5 C
Thailand
22.2 C
Indonesia
28.5 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

Honor showcases early low-light camera performance of the Magic 8 Pro

Honor offers an early look at the Magic 8 Pro’s upgraded low-light camera performance during brief testing at the Singapore Oceanarium.

StarHub partners NeutraDC to boost regional quantum-safe connectivity

StarHub and NeutraDC partner to expand quantum-safe and low-latency connectivity between Singapore and Indonesia.

AMD powers Zyphra’s large-scale AI training milestone

Zyphra trains its ZAYA1 foundation model entirely on AMD hardware, marking a major step for large-scale AI development.

AI browsers vulnerable to covert hacks using simple URL fragments, experts warn

Experts warn AI browsers can be hacked with hidden URL fragments, posing risks invisible to traditional security measures.

IBM expands Storage Scale System 6000 to support full-rack capacity of 47PB

IBM expands its Storage Scale System 6000 to a full-rack capacity of 47PB, boosting performance for AI, supercomputing, and large-scale data workloads.

Let It Die: Inferno launches with extensive AI-generated elements

Let It Die: Inferno launches on 3 December with AI-generated voices, music, and graphics, sparking debate among fans.

Samsung introduces Galaxy Tab A11+ with larger display, AI features, and long-term software support

Samsung launches the Galaxy Tab A11+, an affordable 11-inch tablet with AI tools, long battery life, and seven years of software support.

Solera highlights AI, sustainability and leadership at Insurtech Insights Asia

Solera showcases AI innovation, sustainability initiatives and leadership programmes at Insurtech Insights Asia in Hong Kong.

Macquarie Data Centres marks construction milestone for new 47MW Sydney facility

Macquarie Data Centres completes the structural phase of its 47MW IC3 Super West facility, set to boost Sydney’s AI and cloud capacity in 2026.

Related Articles

Popular Categories