Friday, 7 November 2025
29.2 C
Singapore
25.5 C
Thailand
20.5 C
Indonesia
28.5 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

Ambitionz introduces Cipher, an AI platform built to think like a game developer

Ambitionz launches Cipher, an AI designed to think like a game developer, with early access for Roblox creators worldwide.

VoidZero secures US$12.5 million Series A to launch unified JavaScript toolchain Vite+

VoidZero raises US$12.5 million Series A to launch Vite+, a unified JavaScript toolchain aimed at boosting developer productivity.

Disney Plus to release original Fortnite x The Simpsons animated shorts

Disney Plus releases four new Fortnite x The Simpsons shorts in November, also viewable within the game itself.

Bluesky tests the dislike button and ‘social proximity’ to improve user interactions

Bluesky tests a private dislike button and ‘social proximity’ system to improve conversations and foster more meaningful online interactions.

Pure Storage and Cisco unveil enterprise AI factories with NVIDIA integration

Pure Storage and Cisco partner with NVIDIA to launch an integrated AI factory platform helping enterprises scale AI from pilot to production.

Ambitionz introduces Cipher, an AI platform built to think like a game developer

Ambitionz launches Cipher, an AI designed to think like a game developer, with early access for Roblox creators worldwide.

Corning and Nokia partner to bring fibre to the edge for enterprise networks

Corning and Nokia partner to deliver fibre-to-the-edge and optical LAN solutions, offering scalable, high-speed, and sustainable enterprise networks.

AI adoption grows 20% in Singapore as 170,000 businesses embrace the technology

AI adoption in Singapore rises 20% in 2025, with 170,000 businesses now using AI across finance, tech, and healthcare sectors.

Hitachi Vantara launches Hitachi iQ Studio to accelerate enterprise AI adoption

Hitachi Vantara launches Hitachi iQ Studio to simplify and scale AI deployment with no-code tools and enterprise-grade governance.

Related Articles

Popular Categories