Tuesday, 18 November 2025
26.3 C
Singapore
19.9 C
Thailand
20.6 C
Indonesia
27.2 C
Philippines

In brief: Report shows close to 300 Windows 10 executables vulnerable to DLL hijacking

  • In a new report from a PwC UK security researcher Wietze Beukema, it shows that almost 300 Windows 10 executables are vulnerable to DLL hijacking.
  • A simple VBScript may be enough to allow users to gain administrative access and bypass UAC entirely on Windows 10.
  • “It turns out nearly 300 executables in your System32 folder are vulnerable to relative path DLL Hijacking. Did you know that with a simple VBScript some of these EXEs can be used to elevate such executions, bypassing UAC entirely?” noted Beukema.
  • The vulnerability referred to here is relative path DLL hijacking, which is when an attacker can cause a legitimate Windows executable to load an arbitrary DLL of the attacker’s choice, most likely with malicious intent.
  • DLL hijacking attacks can prove useful to a skilled attacker as they grant capabilities such as arbitrary code execution, privilege escalation, and persistence on the target system.
  • The various techniques of DLL hijacking covered by the Beukema’s blog post include DLL replacement, DLL Proxying, DLL search order hijacking, Phantom DLL hijacking, DLL redirection, WinSxS DLL replacement, and relative path DLL Hijacking.
  • Beukema suggests a few prevention methods that can be used to deter such attacks, such as looking for activity in the mock windows \ folder, should one be present on your machine.
  • Also, adjusting UAC settings to “always notify” could help prevent attacks like this, should the end-user be savvy enough to understand what is about to be executed.
  • Another strategy is monitoring instances of DLL creation and loading from unexpected file paths:
  • When building applications, developers should enforce using absolute and not relative paths for loading DLLs, among several other techniques.
  • None of these may alone be sufficiently foolproof. However, when appropriately applied in conjunction, preventative measures such as those explained by the researcher can deter DLL hijacking attacks by a long shot.

Hot this week

SIAS celebrates corporate excellence at Investors’ Choice Awards 2025

SIAS honours over 40 companies and leaders for excellence in governance, sustainability and transparency at the Investors’ Choice Awards 2025.

GFTN unveils ALFIN, an AI-driven research engine for global finance

GFTN launches ALFIN, an AI-driven research platform offering verifiable, analyst-grade intelligence for finance professionals worldwide.

GFTN Capital and SBI Holdings launch US$200 million global innovation fund

GFTN Capital and SBI Holdings have launched a US$200 million fund to accelerate global FinTech innovation and responsible growth.

Mizuho Bank accelerates ISO 20022 compliance with new Boomi-powered platform

Mizuho Bank speeds up ISO 20022 adoption with a Boomi-powered platform that improves onboarding and streamlines payments across Asia Pacific.

ASUS opens pre-orders for ROG x Hatsune Miku gaming PC in Singapore

ASUS opens pre-orders in Singapore for its themed ROG x Hatsune Miku gaming PC and peripherals bundle.

Call of Duty: Black Ops 7 faces backlash from players over AI-generated content

Players slam Call of Duty: Black Ops 7 over AI-generated art and gameplay issues despite strong critical reviews.

LinkedIn introduces AI-powered search to help users find the right people

LinkedIn introduces AI-powered search to help users find relevant people more quickly, starting with Premium members in the US.

UBS partners with Ant International on blockchain-based cross-border settlement

UBS and Ant International partner to explore blockchain-based cross-border payment and liquidity innovations through a new Singapore-based collaboration.

Belkin recalls iPhone tracking stand and power banks over fire safety concerns

Belkin recalls iPhone stands and power banks after overheating defects raise fire and burn safety concerns.

Related Articles

Popular Categories