Wednesday, 24 December 2025
26.9 C
Singapore
12.8 C
Thailand
20.6 C
Indonesia
26.2 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

[output_post_excerpt]
  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

Super Mario Bros inspired Hideo Kojima’s path into game development

Hideo Kojima reveals how Super Mario Bros convinced him that video games could one day surpass movies and led him into game development.

Thoughtworks: Singapore’s financial OS upgrade, agentic AI and the race for the future of wealth

How agentic AI could reshape wealth management in Singapore by enhancing personalisation, improving responsiveness and elevating the role of advisers.

Apple explores iPhone-class chip for future MacBook, leaks suggest

Leaked Apple files hint at testing a MacBook powered by an iPhone-class chip, suggesting a possible lower-cost laptop in the future.

Antler invests US$5.6 million across 14 AI startups with early commercial traction

Antler invests US$5.6 million in 14 AI startups with early traction, focusing on applied AI and real-world enterprise adoption.

Sharp launches 4-in-1 Plasmacluster dehumidifier for modern homes

Sharp unveils a 4-in-1 dehumidifier combining humidity control, drying and air purification to improve indoor comfort in modern homes.

Square Enix releases Final Fantasy VII Remake Intergrade demo on Switch 2 and Xbox

Free demo for Final Fantasy VII Remake Intergrade launches on Switch 2 and Xbox, letting players carry progress into the full 2026 release.

AI designs a Linux computer with 843 parts in a single week

Quilter reveals a Linux computer designed by AI in one week, hinting at a future where hardware development is faster and more accessible.

Super Mario Bros inspired Hideo Kojima’s path into game development

Hideo Kojima reveals how Super Mario Bros convinced him that video games could one day surpass movies and led him into game development.

Indie Game Awards withdraws Clair Obscur honours over generative AI use

Indie Game Awards withdraws Clair Obscur’s top honours after confirming generative AI assets were used during the game’s production.

Related Articles

Popular Categories