Saturday, 29 November 2025
28.6 C
Singapore
25 C
Thailand
24.5 C
Indonesia
28.5 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

Activision stays quiet on Call of Duty: Black Ops 7 launch performance

Activision’s unusual silence on Black Ops 7’s launch performance raises questions amid competition, lower sales, and mixed player reactions.

Epic CEO questions the relevance of AI labels in game stores

Epic CEO Tim Sweeney questions the need for AI labels in game stores amid industry debates over transparency and the future role of AI.

Kaspersky warns of AI-generated sites distributing remote access software in global campaign

Kaspersky reports a global campaign using AI-generated websites to distribute remote access tools and gain control of victims’ devices.

Google warns staff of rapid scaling demands to keep pace with AI growth

Google tells staff it must double AI capacity every six months as leaders warn of rapid growth, rising demand, and tough years ahead.

Google denies claims that Gmail data is used to train the Gemini AI model

Google denies claims that Gmail content is used to train its Gemini AI model, offering clarity on Smart Features and user privacy.

Apple is expected to overtake Samsung as the world’s leading smartphone maker

Apple is projected to overtake Samsung as the world’s top smartphone maker, driven by strong iPhone 17 demand and upcoming device launches.

Singapore orders Apple and Google to stop spoofed government identities on messaging apps

Singapore orders Apple and Google to block spoofed government identities on messaging apps to curb rising impersonation scams.

Nintendo acquires Bandai Namco Studios Singapore

Nintendo acquires Bandai Namco Studios Singapore to boost game development and expand its subsidiary network.

Google DeepMind opens new AI research lab in Singapore to strengthen regional language capabilities

Google DeepMind opens a new AI lab in Singapore to boost regional language understanding, research partnerships, and real-world innovation.

Related Articles

Popular Categories