back to top
20.6 C
Johannesburg
spot_imgspot_img
More
    spot_img

    Date:

    Share:

    Kaspersky: DLL hijacking attacks have doubled since 2023

    Dynamic link library (DLL) hijacking is a common technique in which attackers replace a library loaded by a legitimate process with a malicious one. It is used by creators of mass-impact malware, like stealers and banking Trojans, as well as by APT (advanced persistent threat) and cybercrime groups behind targeted attacks. Kaspersky reports that DLL hijacking attacks have doubled in the past two years.

    Kaspersky has observed this technique and its variations, like DLL sideloading, in targeted attacks on organisations in RussiaAfricaSouth Korea, as well as other countries and regions. To further enhance its protection capabilities against this threat, Kaspersky SIEM has introduced a specialised AI-based subsystem that continuously analyses information about all loaded libraries.

    The new feature has already proven effective, helping to detect an attack by the APT group ToddyCat. It enabled the threat to be identified and blocked at an early stage, preventing any impact on the targeted organisations. The model also uncovered attempts to infect potential victims with an infostealer and a malicious loader.

    “We are seeing DLL hijacking attacks become more common, where a trusted program is tricked into loading a fake library instead of the real one. This gives attackers a way to secretly run their malicious code. This technique is difficult to detect, and this is where AI can help. Using advanced protection techniques empowered with AI is now essential to staying ahead of these evolving threats and keeping critical systems safe,” says Anna Pidzhakova, Data Scientist at Kaspersky’s AI Research Center.

    Securelist has published two related articles: the first explains how a machine-learning model was developed to detect DLL hijacking attacks, while the second describes how this model was integrated into the Kaspersky SIEM platform. The updated Kaspersky SIEMnow features AI functionality for detecting signs of DLL hijacking attacks, improving detection efficiency.

    spot_img
    spot_imgspot_img

    ━ More like this

    Tired, trusted and targeted: The new face of insider cyber risk

    Most organisations link employee well-being to productivity, but overlook the direct correlation between high-pressure work environments and heightened cybersecurity risk. In an era of...

    Kaspersky warns of blackmail from alleged “hackers”, “law enforcement” and “hitmen”

    Attackers are incorporating personal details like full names and phone numbers in scam emails to appear credible and induce panic among victims. Scammers may...

    Navigating the security sprawl: Why a unified view is the cornerstone of cyber resilience

    South African organisations are facing an unprecedented wave of cybersecurity incidents. According to the CSIR, 88% of organisations have now faced at least one data...

    In2IT CIO Cybersecurity Roundtable explores why cybersecurity is a foundational pillar of the modern digital landscape

    Technology consulting services provider In2IT Technologies hosted its second annual CIO Cybersecurity Roundtable discussion last week, in partnership with the Gauteng Department of e-Government,...

    Why your company’s cybersecurity strategy is probably wrong – and how to fix it

    Recently, I asked a room full of business leaders who among them would rate their cybersecurity posture as "excellent." Only one hand went up....
    spot_imgspot_img