Wednesday, 10 December 2025
27 C
Singapore
19.5 C
Thailand
20.8 C
Indonesia
26.8 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

Solace launches Agent Mesh Enterprise to support real-time agentic AI adoption

Solace launches Agent Mesh Enterprise to help organisations build and scale real-time agentic AI applications across the enterprise.

Sony introduces A7 V with updated sensor, faster processing, and improved stabilisation

Sony launches the A7 V with a new sensor, a faster processor, and upgraded stabilisation, targeting hybrid shooters with enhanced features.

Sony launches the Alpha 7 V with new sensor, AI-powered processing and enhanced reliability

Sony introduces the Alpha 7 V with a new 33MP sensor, updated AI processing and enhanced reliability for photography and video.

Tech industry overlooks Auracast as momentum quietly builds

Auracast promises major improvements in wireless audio, but limited marketing and slow adoption mean many consumers still don't know it exists.

2026 Predictions Part 1: The five forces reshaping Asia’s digital economy

Five forces are redefining Asia’s digital economy in 2026, from AI adoption and data sovereignty to new security and workforce demands.

ByteDance faces growing resistance as Chinese apps block its AI-driven smartphone

Chinese apps restrict ByteDance’s new AI smartphone as developers raise concerns over automation, security and privacy.

Pudu Robotics unveils new robot dog as it expands global presence

Pudu Robotics unveils its new D5 robot dog in Tokyo as part of its global push into service and industrial robotics.

Nintendo launches official eShop and Switch Online service in Singapore

Nintendo launches the Singapore eShop and Switch Online service, giving local players full access to digital games, subscriptions, and regional deals.

2026 Predictions Part 1: The five forces reshaping Asia’s digital economy

Five forces are redefining Asia’s digital economy in 2026, from AI adoption and data sovereignty to new security and workforce demands.

Related Articles

Popular Categories