Feb. 23, 2024, midnight | Tom Fakterman, Chen Erlich and Assaf Dahan

Unit42 unit42.paloaltonetworks.com

Dynamic-link library (DLL) hijacking remains a popular technique to run malware. We address its evolution using examples from the realm of cybercrime and more.


The post Intruders in the Library: Exploring DLL Hijacking appeared first on Unit 42.

address advanced threat prevention advanced url filtering advanced wildfire asyncrat cloaked ursa cloud-delivered security services cybercrime dll dll hijacking dll sideloading dns security dridex dynamic examples hijacking library link malware next generation firewall plugx popular prisma cloud realm run unit 42

More from unit42.paloaltonetworks.com / Unit42

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Associate Principal Security Engineer

@ Activision Blizzard | Work from Home - CA

Security Engineer- Systems Integration

@ Meta | Bellevue, WA | Menlo Park, CA | New York City

Lead Security Engineer (Digital Forensic and IR Analyst)

@ Blue Yonder | Hyderabad

Senior Principal IAM Engineering Program Manager Cybersecurity

@ Providence | Redmond, WA, United States

Information Security Analyst II or III

@ Entergy | The Woodlands, Texas, United States