Feb. 18, 2024, 8:31 a.m. | C M UPPIN

InfoSec Write-ups - Medium infosecwriteups.com

One of my favorite techniques, which every APT group uses in cyber attacks, involves DLL SideLoading.

Most commonly, we see APT groups using signed Microsoft executables to load malicious DLLs.

From the attacker’s point of view :
The threat actor sends a zip file containing a malicious DLL and a Microsoft-signed executable. The threat actor tricks the user into executing the signed executable. When the executable is run, the malicious DLL is loaded, downloads the second stage payload, creates persistence, …

actor adversary adversary emulation apt apt group apt groups attacker attacks blue team cyber cyber attacks cybersecurity dll dll sideloading emulation file hunting malicious microsoft point sideloading techniques threat threat actor threat hunting zip

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant Sécurité SI Gouvernance - Risques - Conformité H/F - Strasbourg

@ Hifield | Strasbourg, France

Lead Security Specialist

@ KBR, Inc. | USA, Dallas, 8121 Lemmon Ave, Suite 550, Texas

Consultant SOC / CERT H/F

@ Hifield | Sèvres, France