Wednesday, 19 November 2025
30.2 C
Singapore
20.4 C
Thailand
25.5 C
Indonesia
28.4 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

ASUS opens pre-orders for ROG x Hatsune Miku gaming PC in Singapore

ASUS opens pre-orders in Singapore for its themed ROG x Hatsune Miku gaming PC and peripherals bundle.

Nium joins Visa’s stablecoin settlement pilot to advance cross-border payments

Nium joins Visa’s stablecoin settlement pilot to modernise cross-border payments with faster, more secure blockchain-based settlements.

vivo launches X300 series in Singapore with 200 MP ZEISS imaging

vivo launches its X300 series in Singapore with upgraded ZEISS cameras, new OriginOS software, stronger performance and CASETiFY editions.

Bloomberg hosts first Code Crunch Hackathon in Singapore to advance real-world financial innovation

Bloomberg hosts its first Code Crunch Hackathon in Singapore, showcasing student and industry solutions for real-world financial challenges.

GFTN Capital and Accion form global alliance to advance inclusive FinTech

GFTN Capital and Accion partner to boost inclusive FinTech, driving responsible innovation for underserved communities worldwide.

Apple’s ring light-style feature reaches Windows first through Microsoft VP’s new tool

Windows users gain early access to a ring light-style screen feature through Microsoft VP Scott Hanselman’s new Windows Edge Light tool.

Jeff Bezos to co-lead AI startup Project Prometheus

Jeff Bezos will become co-CEO of AI startup Project Prometheus, focusing on manufacturing technologies.

When fraud is inevitable, resilience becomes the real defence

As identity scams and deepfakes surge, companies must focus on recoverability. Here’s why resilience now matters most.

Singapore organisations face rising data risks amid AI adoption and data sprawl, says Proofpoint

Proofpoint’s 2025 report finds Singapore firms face growing data security risks as AI tools and data sprawl intensify insider threats.

Related Articles

Popular Categories