Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One

Posted on August 2, 2025August 2, 2025 By CWS

LockBit ransomware operators have adopted an more and more subtle method to evade detection by leveraging DLL sideloading strategies that exploit the inherent belief positioned in reputable purposes.

This stealthy methodology includes tricking reputable, digitally signed purposes into loading malicious Dynamic Hyperlink Libraries as a substitute of their supposed parts, permitting cybercriminals to execute ransomware payloads whereas masquerading as trusted system processes.

The method has confirmed significantly efficient as a result of it exploits the Home windows DLL search order mechanism, the place purposes seek for required libraries in particular listing sequences.

By strategically putting malicious DLLs with similar names to reputable ones in directories which might be searched earlier than the precise library areas, attackers can hijack the loading strategy of trusted purposes.

This method bypasses many conventional safety measures that depend on software popularity and digital signatures for menace detection.

Latest LockBit assault chain (Supply – Safety)

Latest assault campaigns have demonstrated LockBit’s evolution past typical deployment strategies, with menace actors now combining DLL sideloading with intensive masquerading strategies.

Safety menace intelligence analysts have recognized a number of cases the place attackers rename malicious executables to imitate firm domains, additional enhancing their capability to mix into reputable community visitors and keep away from detection by safety monitoring methods.

One other latest LockBit assault chain (Supply – Safety)

The ransomware group has been noticed concentrating on high-value organizations by preliminary entry by way of distant administration instruments comparable to MeshAgent and TeamViewer, subsequently deploying their subtle DLL sideloading mechanism to determine persistence and execute the encryption payload.

Superior DLL Sideloading Implementation

LockBit’s implementation of DLL sideloading demonstrates exceptional technical sophistication, using three major reputable software combos to ship their ransomware payload.

Essentially the most distinguished instance includes the Java platform parts Jarsigner.exe and jli.dll, the place attackers place a reputable jarsigner.exe alongside a malicious jli.dll in the identical listing.

When executed, jarsigner.exe naturally makes an attempt to load jli.dll for its performance, inadvertently loading the malicious model that serves as a loader for the LockBit payload.

Equally, the group exploits Home windows Defender parts through the use of a renamed MpCmdRun.exe, masqueraded with firm domains, paired with a malicious mpclient.dll.

This specific method is very insidious because it leverages safety software program parts to ship malware, making detection considerably more difficult for safety groups.

perform gg($path) {
$ke = GER(32); $ig =GER(16);
$information=gci $path -Recurse -Embody *.pdf, *.doc, *.docx, *.xls, *.xlsx
foreach ($file in $information) { EFI $file $key $iv $eee }
}

The encryption course of employs a hybrid RSA and AES encryption scheme embedded inside obfuscated PowerShell scripts.

Information are encrypted utilizing randomly generated AES keys, that are then encrypted with an embedded RSA public key, guaranteeing that decryption stays inconceivable with out the corresponding non-public key held by the attackers.

The ransomware targets over thirty completely different file extensions and appends the distinctive .xlockxlock extension to encrypted information, making the impression instantly seen to victims whereas guaranteeing complete knowledge encryption throughout numerous file sorts generally present in enterprise environments.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:App, DLL, Legitimate, Load, LockBit, Malicious, Operators, Sideloading, Stealthy, Technique

Post navigation

Previous Post: 11,000 Android Devices Hacked by Chinese Threats Actors to Deploy PlayPraetor Malware
Next Post: Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS

Related Posts

North Korean Hackers Using EtherHiding to Deliver Malware and Steal Cryptocurrency Cyber Security News
Lazarus APT Hackers Using ClickFix Technique to Steal Sensitive Intelligence Data Cyber Security News
Evolution of DDoS Attacks Mitigation Strategies for 2025 Cyber Security News
Beware of North Korean Fake Job Platform Targeting U.S. Based AI-Developers Cyber Security News
Top 10 Best Model Context Protocol (MCP) Servers in 2025 Cyber Security News
Cybersecurity Professionals Charged for Deploying ALPHV BlackCat Ransomware Against US Companies Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • In Other News: Paid for Being Jailed, Google’s $68M Settlement, CISA Chief’s ChatGPT Leak
  • UAT-8099 Targets Vulnerable IIS Servers Using Web Shells, PowerShell, and Region-Customized BadIIS
  • Aisy Launches Out of Stealth to Transform Vulnerability Management
  • 175,000 Exposed Ollama Hosts Could Enable LLM Abuse
  • TAMECAT PowerShell-Based Backdoor Exfiltrates Login Credentials from Microsoft Edge and Chrome

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark