Sunday, 23 November 2025
30.3 C
Singapore
23.7 C
Thailand
21.6 C
Indonesia
27.3 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

Rubrik research highlights rising identity threats as AI agents spread across workplaces

Rubrik research shows Singapore organisations face rising identity threats as AI agents expand, driving urgent demand for stronger resilience.

Kaspersky warns of rising ransomware risks for global manufacturing in 2025

Kaspersky warns global manufacturing could have faced over US$18 billion in ransomware-related downtime losses in early 2025.

LinkedIn introduces AI-powered search to help users find the right people

LinkedIn introduces AI-powered search to help users find relevant people more quickly, starting with Premium members in the US.

Solo Leveling earphones bring anime fandom and hardware design together

BEENOS unveils limited edition Solo Leveling wireless earphones with new Shun Mizuno voice lines and themed hardware design.

Neo4j uses graph intelligence to map fan predictions for Stranger Things’ final season

Neo4j launches HopperGraph, an AI-powered visualisation that maps fan theories to predict the final season of Stranger Things.

Meta explores an AI briefing tool aimed at Facebook users

Meta is developing Project Luna, an AI tool designed to deliver personalised morning Facebook briefings to users.

Final Fantasy Tactics remake brings renewed challenge to modern consoles

A modern remake of Final Fantasy Tactics brings updated visuals, classic strategy gameplay and steep challenges to today’s major consoles.

HP and Dell turn off HEVC support on selected laptop models

HP and Dell turn off HEVC support on selected laptops, limiting browser playback and prompting users to rely on third-party software.

Microsoft adds on-device AI support to the Advanced Paste tool in Windows 11

Microsoft updates Advanced Paste in Windows 11 with on-device AI support, new model options and an improved interface.

Related Articles

Popular Categories