Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

LockBit Operators Using Stealthy DLL Sideloading Technique to Load Malicious App as Legitimate One

Posted on August 2, 2025August 2, 2025 By CWS

LockBit ransomware operators have adopted an more and more subtle method to evade detection by leveraging DLL sideloading strategies that exploit the inherent belief positioned in reputable purposes.

This stealthy methodology includes tricking reputable, digitally signed purposes into loading malicious Dynamic Hyperlink Libraries as a substitute of their supposed parts, permitting cybercriminals to execute ransomware payloads whereas masquerading as trusted system processes.

The method has confirmed significantly efficient as a result of it exploits the Home windows DLL search order mechanism, the place purposes seek for required libraries in particular listing sequences.

By strategically putting malicious DLLs with similar names to reputable ones in directories which might be searched earlier than the precise library areas, attackers can hijack the loading strategy of trusted purposes.

This method bypasses many conventional safety measures that depend on software popularity and digital signatures for menace detection.

Latest LockBit assault chain (Supply – Safety)

Latest assault campaigns have demonstrated LockBit’s evolution past typical deployment strategies, with menace actors now combining DLL sideloading with intensive masquerading strategies.

Safety menace intelligence analysts have recognized a number of cases the place attackers rename malicious executables to imitate firm domains, additional enhancing their capability to mix into reputable community visitors and keep away from detection by safety monitoring methods.

One other latest LockBit assault chain (Supply – Safety)

The ransomware group has been noticed concentrating on high-value organizations by preliminary entry by way of distant administration instruments comparable to MeshAgent and TeamViewer, subsequently deploying their subtle DLL sideloading mechanism to determine persistence and execute the encryption payload.

Superior DLL Sideloading Implementation

LockBit’s implementation of DLL sideloading demonstrates exceptional technical sophistication, using three major reputable software combos to ship their ransomware payload.

Essentially the most distinguished instance includes the Java platform parts Jarsigner.exe and jli.dll, the place attackers place a reputable jarsigner.exe alongside a malicious jli.dll in the identical listing.

When executed, jarsigner.exe naturally makes an attempt to load jli.dll for its performance, inadvertently loading the malicious model that serves as a loader for the LockBit payload.

Equally, the group exploits Home windows Defender parts through the use of a renamed MpCmdRun.exe, masqueraded with firm domains, paired with a malicious mpclient.dll.

This specific method is very insidious because it leverages safety software program parts to ship malware, making detection considerably more difficult for safety groups.

perform gg($path) {
$ke = GER(32); $ig =GER(16);
$information=gci $path -Recurse -Embody *.pdf, *.doc, *.docx, *.xls, *.xlsx
foreach ($file in $information) { EFI $file $key $iv $eee }
}

The encryption course of employs a hybrid RSA and AES encryption scheme embedded inside obfuscated PowerShell scripts.

Information are encrypted utilizing randomly generated AES keys, that are then encrypted with an embedded RSA public key, guaranteeing that decryption stays inconceivable with out the corresponding non-public key held by the attackers.

The ransomware targets over thirty completely different file extensions and appends the distinctive .xlockxlock extension to encrypted information, making the impression instantly seen to victims whereas guaranteeing complete knowledge encryption throughout numerous file sorts generally present in enterprise environments.

Combine ANY.RUN TI Lookup together with your SIEM or SOAR To Analyses Superior Threats -> Attempt 50 Free Trial Searches

Cyber Security News Tags:App, DLL, Legitimate, Load, LockBit, Malicious, Operators, Sideloading, Stealthy, Technique

Post navigation

Previous Post: How to Safely Use AI Chatbots and Assistants
Next Post: Qilin Ransomware Surging Following The Fall of dominant RansomHub RaaS

Related Posts

Sophisticated Skitnet Malware Actively Adopted by Ransomware Gangs to Streamline Operations Cyber Security News
How to Use Threat Intelligence to Enhance Cybersecurity Operations Cyber Security News
Graphite Spyware Exploits Apple iOS Zero-Click Vulnerability to Attack Journalists Cyber Security News
Microsoft Details Scattered Spider TTPs Observed in Recent Attack Chains Cyber Security News
Hackers Actively Exploiting CitrixBleed 2 Vulnerability in the Wild Cyber Security News
Ubiquiti UniFi Devices Vulnerability Allows Attackers to Inject Malicious Commands Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access
  • SonicWall Firewall Devices 0-day Vulnerability Actively Exploited by Akira Ransomware
  • Akira Ransomware Exploits SonicWall VPNs in Likely Zero-Day Attack on Fully-Patched Devices
  • Lazarus Hackers Weaponized 234 Packages Across npm and PyPI to Infect Developers
  • SafePay Ransomware Infected 260+ Victims Across Multiple Countries

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News