Thursday, 4 December 2025
29 C
Singapore
29.6 C
Thailand
25.9 C
Indonesia
28.7 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

The forgotten battle royale that ended a studio still deserved more than a one-month run

A look back at Radical Heights, the short-lived battle royale that showed promise but shut down after just one month.

Kaspersky reports sharp rise in daily malicious file detections in 2025

Kaspersky reports a rise in global cyberthreats in 2025, detecting 500,000 malicious files daily and significant growth in spyware and password stealers.

Ayaneo unveils the Next II, a powerful handheld with a 9-inch display

Ayaneo reveals the Next II handheld with a 9-inch OLED display, a Ryzen AI Max+ chip, and advanced controls, aimed at high-end gamers.

Apple is expected to overtake Samsung as the world’s leading smartphone maker

Apple is projected to overtake Samsung as the world’s top smartphone maker, driven by strong iPhone 17 demand and upcoming device launches.

SMRT upgrades Bishan Depot with automation to double train overhaul capacity

SMRT upgrades Bishan Depot with automation to double overhaul capacity and enhance safety, efficiency, and workforce sustainability.

Ulanzi MT-74 review: A compact and versatile tripod for action cameras

The Ulanzi MT-74 is a lightweight magnetic quick-release tripod offering versatility, stability, and seamless vertical-horizontal shooting.

Audio-Technica unveils flagship ATH-ADX7000 open-air headphones

Audio-Technica releases the ATH-ADX7000, a flagship open-air headphone built around a new high-precision driver and lightweight design.

Sony launches the Alpha 7 V with new sensor, AI-powered processing and enhanced reliability

Sony introduces the Alpha 7 V with a new 33MP sensor, updated AI processing and enhanced reliability for photography and video.

SynaXG secures more than US$20 million in pre-Series A funding to drive global AI-RAN growth

SynaXG raises over US$20 million to expand its AI-RAN technology and accelerate global adoption of next-generation wireless infrastructure.

Related Articles

Popular Categories