• Hello and welcome! Register to enjoy full access and benefits:

    • Advertise in the Marketplace section for free.
    • Get more visibility with a signature link.
    • Company/website listings.
    • Ask & answer queries.
    • Much more...

    Register here or log in if you're already a member.

  • 🎉 WHV has crossed 56000 (56k) monthly views (unique) and 285135 clicks per month, as per Google Analytics! Thank you for your support! 🎉

DLL Sideloading Attack by China-Aligned APT Targeting Government and Media

johny899

New Member
Content Writer
Messages
859
Reaction score
3
Points
23
Balance
$1,053.6USD
Have you heard of DLL sideloading? This is a sneaky way for hackers to attack a target, and a China linked APT group called "Autumn Dragon" has been using it to attack government offices and media companies in Southeast Asia. I read about this recently on CyberPress and, frankly, it's informative but also somewhat scary.

What is DLL Sideloading?​

DLL sideloading is when an attacker tricks a normal program into running a malicious code, not through attacking the program itself, but by placing a fake DLL (Dynamic Link Library) alongside it. When the program is run, it calls the fake DLL and thinks it is legitimate which is part of the reason it is hard for security software to recognize."

How Autumn Dragon Carries Out Its Targeting​

As discussed above, this group uses a step-by-step targeting approach:

• It starts with a phishing email that contains a malicious RAR file.
• Once that file is opened, it drops a batch file that downloads more malware and ensures it runs every time the computer is restarted.
• Then comes the tactic of DLL sideloading where they use trusted apps like OBS Browser, Adobe Creative Cloud Helper and OperaGX to execute the fake dll.
• The fake malicious dll communicates to a Telegram bot which allows the attackers to send commands, take screenshots or even upload more malware.
• They do this while hiding their actions by using encrypted files and HTTPS, making it hard to detect any nasty software during the communication process.

Why trust these specific applications? Because users trust them and so their antivirus software typically won't flag them.

Who Are Their Targets?​

The main targeting occurs in Southeast Asian countries specifically Indonesia, Singapore, the Philippines, Laos and Cambodia. They are primarily targeting government offices and media due to information being of interest to the group. They even ensure they are not hitting the wrong targets, using location information to assist with that process.

Why This Is Important​

This illustrates the intelligence and patience of today’s hackers. They hide their actions within normal network traffic and leverage trusted applications to avoid detection. This should remind security teams to always watch for DLL behavior and use tools that can identify an unusual activity.

Conclusion​

Even though DLL sideloading sounds technical and complicated, the takeaway is simple: don’t trust everything you see. A hacker can use trusted programs to meet their nefarious goals. Be aware of which DLLs an application may load, educate your users about phishing emails, and patch your systems regularly.

The next time you run a typical program, think to yourself - is this really safe! Stay vigilant and protect your systems!
 
Last edited:
Top