spot_img

Date:

Share:

Kaspersky: DLL hijacking attacks have doubled since 2023

Dynamic link library (DLL) hijacking is a common technique in which attackers replace a library loaded by a legitimate process with a malicious one. It is used by creators of mass-impact malware, like stealers and banking Trojans, as well as by APT (advanced persistent threat) and cybercrime groups behind targeted attacks. Kaspersky reports that DLL hijacking attacks have doubled in the past two years.

Kaspersky has observed this technique and its variations, like DLL sideloading, in targeted attacks on organisations in RussiaAfricaSouth Korea, as well as other countries and regions. To further enhance its protection capabilities against this threat, Kaspersky SIEM has introduced a specialised AI-based subsystem that continuously analyses information about all loaded libraries.

The new feature has already proven effective, helping to detect an attack by the APT group ToddyCat. It enabled the threat to be identified and blocked at an early stage, preventing any impact on the targeted organisations. The model also uncovered attempts to infect potential victims with an infostealer and a malicious loader.

“We are seeing DLL hijacking attacks become more common, where a trusted program is tricked into loading a fake library instead of the real one. This gives attackers a way to secretly run their malicious code. This technique is difficult to detect, and this is where AI can help. Using advanced protection techniques empowered with AI is now essential to staying ahead of these evolving threats and keeping critical systems safe,” says Anna Pidzhakova, Data Scientist at Kaspersky’s AI Research Center.

Securelist has published two related articles: the first explains how a machine-learning model was developed to detect DLL hijacking attacks, while the second describes how this model was integrated into the Kaspersky SIEM platform. The updated Kaspersky SIEMnow features AI functionality for detecting signs of DLL hijacking attacks, improving detection efficiency.

spot_img
spot_img

━ More like this

Kaspersky identified a new SilverFox campaign targeting companies in South Africa

The APT campaign involved disguising malicious files as documents related to tax violations. Upon infection, attackers could gain remote access to affected devices and...

The rise of response-ready cybersecurity

 If there’s one thing the current threat landscape has made clear, it’s that prevention and response readiness aren’t mutually exclusive – instead, you need...

The energy sector’s ‘digital big bang’: 75% to digitise in two years, but at what cost?

A recent joint study by Kaspersky and VDC revealed that over half of energy organisations have already faced cyber incidents exceeding $1 million in...

Gaps in cybersecurity policies and employee commitment leave organisations vulnerable, Kaspersky survey shows

A recent Kaspersky survey in the Middle East, Turkiye and Africa (META) region entitled “Cybersecurity in the workplace: Employee knowledge and behaviour”, showed that 23%...

69% of businesses ready to share their contractors’ security costs to boost cyber resilience

A new global Kaspersky study has revealed that more than two-thirds of companies are willing to invest in the security of their contractors and...
spot_img