Friday, 21 November 2025
27.7 C
Singapore
21.2 C
Thailand
27.1 C
Indonesia
27.5 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

Salesforce study finds most Singapore technical leaders see data overhaul as vital for AI success

A new Salesforce study finds most Singapore technical leaders say major data overhauls are needed before AI ambitions can succeed.

Lenovo posts record quarterly revenue as hybrid AI strategy gains momentum

Lenovo reports record quarterly revenue as AI devices, hybrid infrastructure, and services drive strong performance.

Kintone reports 36.4% sales surge in first half of 2025 as Southeast Asia demand grows

Kintone reports strong H1 2025 growth with rising enterprise adoption and new generative AI tools driving its global expansion.

NeutraDC signs strategic MoU with AMD to accelerate AI ecosystem integration

NeutraDC and AMD sign an MoU to boost AI ecosystem development and expand high-performance computing access across Southeast Asia.

Google unveils Antigravity, an agent-first coding tool built for Gemini 3

Google launches Antigravity, a new agent-first coding tool for Gemini 3 designed to enhance autonomous software development.

Google TV may introduce solar-powered remote controls

Google TV may soon feature a solar-powered remote, reducing battery waste and offering an eco-friendly solution for streaming devices.

Adobe to acquire Semrush for US$1.9 billion

Adobe plans to acquire Semrush for US$1.9 billion to strengthen its digital marketing and AI-driven search tools.

Roblox’s selfie verification hints at a more intrusive online future

Roblox’s new age verification system signals a growing shift toward identity checks across online platforms, raising safety and privacy concerns.

Lenovo posts record quarterly revenue as hybrid AI strategy gains momentum

Lenovo reports record quarterly revenue as AI devices, hybrid infrastructure, and services drive strong performance.

Related Articles

Popular Categories