Have you heard of
DLL sideloading? This is a sneaky way for hackers to attack a target, and a
China linked
APT group called
"Autumn Dragon" has been using it to attack government offices and media companies in
Southeast Asia. I read about this recently on
CyberPress and, frankly, it's informative but also somewhat scary.
What is DLL Sideloading?
DLL sideloading is when an attacker tricks a normal program into running a malicious code, not through attacking the program itself, but by placing a f
ake DLL (Dynamic Link Library) alongside it. When the program is run, it calls the
fake DLL and thinks it is legitimate which is part of the reason it is hard for security software to recognize."
How Autumn Dragon Carries Out Its Targeting
As discussed above, this group uses a step-by-step targeting approach:
• It starts with a phishing email that contains a
malicious RAR file.
• Once that file is opened, it drops a batch file that downloads more malware and ensures it runs every time the computer is restarted.
• Then comes the tactic of
DLL sideloading where they use trusted apps like
OBS Browser,
Adobe Creative Cloud Helper and
OperaGX to execute the fake dll.
• The
fake malicious dll communicates to a
Telegram bot which allows the attackers to send commands, take screenshots or even upload more malware.
• They do this while hiding their actions by using encrypted files and
HTTPS, making it hard to detect any nasty software during the communication process.
Why trust these specific applications? Because users trust them and so their antivirus software typically won't flag them.
Who Are Their Targets?
The main targeting occurs in
Southeast Asian countries specifically
Indonesia,
Singapore,
the Philippines,
Laos and
Cambodia. They are primarily targeting government offices and media due to information being of interest to the group. They even ensure they are not hitting the wrong targets, using location information to assist with that process.
Why This Is Important
This illustrates the intelligence and patience of today’s hackers. They hide their actions within normal network traffic and leverage trusted applications to avoid detection. This should remind security teams to always watch for DLL behavior and use tools that can identify an unusual activity.
Conclusion
Even though
DLL sideloading sounds technical and complicated, the takeaway is simple: don’t trust everything you see. A hacker can use trusted programs to meet their nefarious goals. Be aware of which
DLLs an application may load, educate your users about
phishing emails, and patch your systems regularly.
The next time you run a typical program, think to yourself - is this really safe! Stay vigilant and protect your systems!