#dllsideloading search results
Cyble Research & Intelligence Labs detected Maranhão Stealer, a Node.js–based credential stealer leveraging reflective DLL injection. #Infostealer #DLLSideloading #Reflective #DLLInjection #SocialEngineering #CredentialStealer cyble.com/blog/inside-ma…
Here's another one: virustotal.com/gui/file/ed244… RAR > Draft AR2025422_640935546.pdf.exe (signed: appletviewer.exe) malicious DLLs: jli.dll concrt141.dll XWorm C2: hciagriitec.ddns[.]net #DLLsideloading #MalwareChallenge
Cyble analyzes a cyberattack specifically engineered to target German citizens via DLL Sideloading, DLL Proxying, and the use of Sliver. cyble.com/blog/sliver-im… #Cyberattack #Sliver #DLLSideloading #DLLProxying #SocialEngineering
Here some #DLLsideloading samples from recent months pastebin.com/raw/Kq7Dfdwc Is someone already making a list of abused DLL-sideloadable EXEs? (Part of LOLbins?) Adding #MalwareChallenge just in case anyone monitors that tag 😜
2024-09-19 (Thurs): As early as 2024-09-10, this infection chain abuses steamerrorreporter64.exe to side-load vstdlib_s64.dll as a downloader to retrieve & run #LummaStealer. Details at bit.ly/3zrV0yY #DllSideLoading #Lumma #TimelyThreatIntel #Unit42ThreatIntel
⚠️#DllSideLoading ☣️firefox.exe/winhttp.dll➡️c2ce2f03afdbc181e74e93e6d9f82def 🔥Low Detection ratio 📡173.194.195.94
🔥#DFIR #CSIRT #Intrusion🔥 1⃣Social engineering Initial access. 2⃣TA leveraged Microsoft Edge to retrieve two dat files from Internet. 3⃣TA archived bot dat files among with a TAR file using command "type". 🫢 4⃣TAR file le contained a malicious DLL masquerading as winhttp.dll.
New #ClickFix activity: User is asked to run PowerShell script that retrieves and runs an MSI file in memory. This infection chain performs #DLLSideLoading using legitimate "NVIDIA Notification.exe" to load a malicious DLL named libcef.dll. More info at bit.ly/4krPhLd
#MalwareChallenge How often do you see a #malware attachment with a clean/benign/signed executable using #DLLsideloading that is not part of a red team ex.? Sample on @abuse_ch Bazaar: bazaar.abuse.ch/sample/141148b…
#Hacking #APT #DLLSideloading #DragonBreath #Gambling #Vulnerability #Malware #CyberCrime #CyberAttack #CyberAttack An APT group tracked as Dragon Breath has been observed employing a new DLL sideloading technique. news.sophos.com/en-us/2023/05/…
Salt Typhoon exploited an unpatched Citrix flaw to sideload malicious DLLs and gain footholds in global infrastructure—ensure Citrix patches are applied, enforce DLL signing, and hunt for unknown modules. infosecurity-magazine.com/news/salt-typh… #infosec #Citrix #DLLSideloading #SupplyChain
Chimera - Automated DLL Sideloading Tool With EDR Evasion Capabilities #DllSideloading #EdrBypass #OffensiveSecurity #Python3 dlvr.it/Sw1BBg
Unveiling the tactics of Mustang Panda APT group exploiting Operamail with DLL sideloading technique. Stay vigilant! @k7computing Read the blog at labs.k7computing.com/index.php/must… #MustangPanda #Operamail #DLLSideloading #Cybersecurity #MaliciousCode #APT #Espionage
Thai officials targeted by Yokai backdoor using DLL side-loading techniques. Deceptive shortcuts in RAR archives lead to stealthy installations. Node.js exploited for crypto miners too. 🛡️🔍 #YokaiBackdoor #DLLSideLoading #CybersecurityNews link: ift.tt/VuDWlwH
A China-nexus APT, Mustang Panda, is targeting the Tibetan community using DLL sideloading and the EnumFontsW API to launch the stealthy Publoader backdoor and achieve persistence. #MustangPanda #DLLsideloading #EnumFontsW #CyberEspionage #Tibet securityonline.info/mustang-panda-…
securityonline.info
Mustang Panda APT Uses Hidden DLL and EnumFontsW to Launch Stealthy Tibet-Themed Campaign
A China-nexus APT, Mustang Panda, is targeting the Tibetan community using DLL sideloading and the EnumFontsW API to launch the stealthy Publoader backdoor and achieve persistence.
DLL Sideloading #DLLSideloading #CyberSecurity #IncidentResponse #Windows #DLLHijacking r-tec.net/r-tec-blog-dll…
r-tec.net
r-tec Blog | DLL Sideloading
The post describes DLL Sideloading, a technique that allows attackers to execute custom malicious code from within legitimate windows binaries/processes.
Ever heard of DLL sideloading? Cyber criminals use this technique to exploit the way Windows loads dynamic link libraries (DLLs) and execute malicious code. Here's how we detected and stopped a #DLLSideloading attack before it could cause any damage: bit.ly/4caku1A
Researchers are investigating a new ransomware variant called Rorschach with several capabilities, including the ability to encrypt data faster than any other ransomware. #DLLsideloading #Encryption #Rorschach securitydailyreview.com/rorschach-rans…
🔺 Researchers discovered two open-source #PyPI packages leveraged by threat actors to infiltrate systems via #DLLsideloading, evading detection tools and raising #supplychain concerns. 🔗Learn more about #malicious packages & their security implications: socradar.io/rise-of-malici…
A new cyber campaign targets German organizations with DLL sideloading and the Sliver implant, starting from spear-phishing emails. APT29's tactics challenge traditional detection systems. 🇩🇪 #Germany #CyberThreats #DLLSideloading link: ift.tt/vZ4x71Q
Rorschach ransomware deployed by misusing a security tool - helpnetsecurity.com/2023/04/06/ror… - @_CPResearch_ @PaloAltoNtwks #Ransomware #DLLSideloading #CybersecurityNews #InfosecNews
Lab52 exposed Lazarus Group using DreamLoader malware via fake job lures. The modular tool chain abuses DLL sideloading and the Microsoft Graph API for stealthy C2 communications. #Lazarus #APTHack #DLLSideloading #Cyberespionage securityonline.info/lazarus-group-…
securityonline.info
Lazarus Group Attacks with DreamLoader Malware, Leveraging DLL Sideloading and Microsoft Graph API...
Lab52 exposed Lazarus Group using DreamLoader malware via fake job lures. The modular tool chain abuses DLL sideloading and the Microsoft Graph API for stealthy C2 communications.
I‘ve seen #DLLsideloading used a lot since March, even in malspam attachs. Most frequently abused is identity_helper.exe (Edge) in different versions. Look at submitted filenames on VT and it‘s easy to spot them.
#MalwareChallenge How often do you see a #malware attachment with a clean/benign/signed executable using #DLLsideloading that is not part of a red team ex.? Sample on @abuse_ch Bazaar: bazaar.abuse.ch/sample/141148b…
Salt Typhoon exploited an unpatched Citrix flaw to sideload malicious DLLs and gain footholds in global infrastructure—ensure Citrix patches are applied, enforce DLL signing, and hunt for unknown modules. infosecurity-magazine.com/news/salt-typh… #infosec #Citrix #DLLSideloading #SupplyChain
Confucius hackers target Pakistan with new phishing campaigns deploying WooperStealer and Anondoor malware using DLL side-loading and obfuscation to evade detection and infiltrate government and military sectors. #WooperStealer #DLLSideLoading ift.tt/kApWNvQ
hendryadrian.com
Confucius Hackers Hit Pakistan With New WooperStealer and Anondoor Malware
Confucius, a long-standing hacking group operating in South Asia, has initiated a new phishing campaign targeting Pakistan with malware like WooperStealer and Anondoor. Their evolving tactics include...
Cyble Research & Intelligence Labs detected Maranhão Stealer, a Node.js–based credential stealer leveraging reflective DLL injection. #Infostealer #DLLSideloading #Reflective #DLLInjection #SocialEngineering #CredentialStealer cyble.com/blog/inside-ma…
Cephalus ransomware used compromised RDP accounts and DLL sideloading via a legitimate SentinelOne binary to load data.bin containing the payload. Monitor RDP access and executable integrity. #RDP #DLLSideloading #Ransomware huntress.com/blog/cephalus-…
QuirkyLoader, a new malware loader active since Nov 2024, spreads Agent Tesla, AsyncRAT, and Snake Keylogger via email spam targeting Taiwan and Mexico using DLL side-loading and process hollowing. #QuirkyLoader #DLLSideLoading #Taiwan ift.tt/O2iu68o
Noodlophile infostealer spreads via spear-phishing emails posing as law firms, using DLL side-loading in signed apps to steal credentials, credit cards, and system data across multiple regions. #Noodlophile #DLLSideLoading #Infostealer ift.tt/VI4cGU1
hendryadrian.com
Noodlophile infostealer is hiding behind fake copyright and PI infringement notices
The article details a spear-phishing campaign targeting businesses across multiple regions using fake law firm emails to spread the Noodlophile infostealer malware. The campaign employs sophisticated...
SentinelLABS and Beazley expose PXA Stealer, a Python-based infostealer campaign targeting 62 countries with stealthy DLL sideloading, decoy files, and Telegram-based data exfiltration. #PXAstealer #Infostealer #DLLsideloading #Cybersecurity securityonline.info/new-pxa-steale…
securityonline.info
New PXA Stealer Campaign Hits 62 Countries with Stealthy DLL Sideloading and Telegram Exfiltration
SentinelLABS and Beazley expose PXA Stealer, a Python-based infostealer campaign targeting 62 countries with stealthy DLL sideloading, decoy files, and Telegram-based data exfiltration.
Dropping Elephant APT Group Targets Turkish Defense Industry With New Campaign and Capabilities: LOLBAS, VLC Player, and Encrypted Shellcode: arcticwolf.com/resources/blog… #cybersecurity #apt #threathunting #informationsecurity #malware #shellcode #dfir #reversing
Check Point Research analysed Storm-2603, a threat actor associated with recent ToolShell exploitations, as well as other Chinese APT groups. Storm-2603 utilizes a custom malware C2 framework, referred to internally by the attacker as “ak47c2”. research.checkpoint.com/2025/before-to…
Symantec's report reveals LockBit is using evolved tactics, including DLL sideloading and process masquerading with legitimate executables, to evade detection and deploy payloads. #LockBit #Ransomware #DLLSideloading #Cybersecurity #MalwareAlert securityonline.info/lockbit-ransom…
Sophos uncovers a new infection chain for GOLD BLADE's RedLoader malware, combining LNK files, WebDAV, and DLL sideloading to bypass defenses and deploy payloads stealthily. #RedLoader #Sophos #DLLSideloading #WebDAV #CybersecurityAlert securityonline.info/gold-blade-unl…
securityonline.info
GOLD BLADE Unleashes RedLoader with Novel Attack Chain: LNK Files + WebDAV + DLL Sideloading Evades...
Sophos uncovers a new infection chain for GOLD BLADE's RedLoader malware, combining LNK files, WebDAV, and DLL sideloading to bypass defenses and deploy payloads stealthily.
Dropping Elephant is targeting Türkiye's defense industry, particularly missile manufacturers, with weaponized conference lures, VLC DLL sideloading, and custom shellcode for intelligence exfiltration. #DroppingElephant #DLLSideloading #APTAttack securityonline.info/dropping-eleph…
securityonline.info
Dropping Elephant Targets Türkiye's Missile Industry with Stealthy Conference Lures & VLC DLL...
Dropping Elephant is targeting Türkiye's defense industry, particularly missile manufacturers, with weaponized conference lures, VLC DLL sideloading, and custom shellcode for intelligence exfiltrat...
Cyble Research & Intelligence Labs detected Maranhão Stealer, a Node.js–based credential stealer leveraging reflective DLL injection. #Infostealer #DLLSideloading #Reflective #DLLInjection #SocialEngineering #CredentialStealer cyble.com/blog/inside-ma…
Cyble analyzes a cyberattack specifically engineered to target German citizens via DLL Sideloading, DLL Proxying, and the use of Sliver. cyble.com/blog/sliver-im… #Cyberattack #Sliver #DLLSideloading #DLLProxying #SocialEngineering
2024-09-19 (Thurs): As early as 2024-09-10, this infection chain abuses steamerrorreporter64.exe to side-load vstdlib_s64.dll as a downloader to retrieve & run #LummaStealer. Details at bit.ly/3zrV0yY #DllSideLoading #Lumma #TimelyThreatIntel #Unit42ThreatIntel
Here's another one: virustotal.com/gui/file/ed244… RAR > Draft AR2025422_640935546.pdf.exe (signed: appletviewer.exe) malicious DLLs: jli.dll concrt141.dll XWorm C2: hciagriitec.ddns[.]net #DLLsideloading #MalwareChallenge
Chimera - Automated DLL Sideloading Tool With EDR Evasion Capabilities #DllSideloading #EdrBypass #OffensiveSecurity #Python3 dlvr.it/Sw1BBg
New #ClickFix activity: User is asked to run PowerShell script that retrieves and runs an MSI file in memory. This infection chain performs #DLLSideLoading using legitimate "NVIDIA Notification.exe" to load a malicious DLL named libcef.dll. More info at bit.ly/4krPhLd
⚠️#DllSideLoading ☣️firefox.exe/winhttp.dll➡️c2ce2f03afdbc181e74e93e6d9f82def 🔥Low Detection ratio 📡173.194.195.94
🔥#DFIR #CSIRT #Intrusion🔥 1⃣Social engineering Initial access. 2⃣TA leveraged Microsoft Edge to retrieve two dat files from Internet. 3⃣TA archived bot dat files among with a TAR file using command "type". 🫢 4⃣TAR file le contained a malicious DLL masquerading as winhttp.dll.
Here some #DLLsideloading samples from recent months pastebin.com/raw/Kq7Dfdwc Is someone already making a list of abused DLL-sideloadable EXEs? (Part of LOLbins?) Adding #MalwareChallenge just in case anyone monitors that tag 😜
Unveiling the tactics of Mustang Panda APT group exploiting Operamail with DLL sideloading technique. Stay vigilant! @k7computing Read the blog at labs.k7computing.com/index.php/must… #MustangPanda #Operamail #DLLSideloading #Cybersecurity #MaliciousCode #APT #Espionage
#TeamViewer #DLLSideloading #Backdoor FileName: 1C.PDF.WinRAR.pdf.scr (DFBC6BEA6331EB424A65D1C98B7F20AB) Russian Decoy PDF. C2: hxxp://liveupdate.online/command.php
#MalwareChallenge How often do you see a #malware attachment with a clean/benign/signed executable using #DLLsideloading that is not part of a red team ex.? Sample on @abuse_ch Bazaar: bazaar.abuse.ch/sample/141148b…
Researchers are investigating a new ransomware variant called Rorschach with several capabilities, including the ability to encrypt data faster than any other ransomware. #DLLsideloading #Encryption #Rorschach securitydailyreview.com/rorschach-rans…
#Hacking #APT #DLLSideloading #DragonBreath #Gambling #Vulnerability #Malware #CyberCrime #CyberAttack #CyberAttack An APT group tracked as Dragon Breath has been observed employing a new DLL sideloading technique. news.sophos.com/en-us/2023/05/…
Rorschach ransomware deployed by misusing a security tool - helpnetsecurity.com/2023/04/06/ror… - @_CPResearch_ @PaloAltoNtwks #Ransomware #DLLSideloading #CybersecurityNews #InfosecNews
Thai officials targeted by Yokai backdoor using DLL side-loading techniques. Deceptive shortcuts in RAR archives lead to stealthy installations. Node.js exploited for crypto miners too. 🛡️🔍 #YokaiBackdoor #DLLSideLoading #CybersecurityNews link: ift.tt/VuDWlwH
A new cyber campaign targets German organizations with DLL sideloading and the Sliver implant, starting from spear-phishing emails. APT29's tactics challenge traditional detection systems. 🇩🇪 #Germany #CyberThreats #DLLSideloading link: ift.tt/vZ4x71Q
Ever heard of DLL sideloading? Cyber criminals use this technique to exploit the way Windows loads dynamic link libraries (DLLs) and execute malicious code. Here's how we detected and stopped a #DLLSideloading attack before it could cause any damage: bit.ly/4caku1A
🔺 Researchers discovered two open-source #PyPI packages leveraged by threat actors to infiltrate systems via #DLLsideloading, evading detection tools and raising #supplychain concerns. 🔗Learn more about #malicious packages & their security implications: socradar.io/rise-of-malici…
New research links 5 cases of DLL sideloading attacks targeting Asian gov't organizations. USB worm infection raises questions on APT group connections.buff.ly/3ZjmL3J #Cybersecurity #DLLSideloading
Something went wrong.
Something went wrong.
United States Trends
- 1. Grammy 354K posts
- 2. Dizzy 10.1K posts
- 3. #FliffCashFriday N/A
- 4. Clipse 21K posts
- 5. #NXXT 1,092 posts
- 6. Kendrick 62.9K posts
- 7. #GOPHealthCareShutdown 7,628 posts
- 8. James Watson 4,337 posts
- 9. Orban 40.7K posts
- 10. #FursuitFriday 12.3K posts
- 11. addison rae 24.5K posts
- 12. olivia dean 15.7K posts
- 13. Katseye 120K posts
- 14. Darryl Strawberry N/A
- 15. Leon Thomas 20.5K posts
- 16. AOTY 22.1K posts
- 17. Thune 73.5K posts
- 18. ravyn lenae 4,756 posts
- 19. Alfredo 2 1,065 posts
- 20. Carmen 49K posts