Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Hunting for Unsigned DLLs to Find APTs
Trends, Reports, Analysis
September 28, 2022
Palo Alto Networks
Unit 42 researchers found that the most common techniques that are being used by threat actors in the wild are DLL loading by rundll32.exe/regsvr32.exe and loading malicious DLLs by abusing the search order of a legitimate process.
Read More
Unsigned DLLs
Malicious DLLs
DLL Side-Loading
DLL Order Hijacking
Raspberry Robin
Publisher
Previous
OpIran: Anonymous declares war on Teheran amid Mahsa Am ...
Trends, Reports, Analysis
Next
The Dire Warnings in the Lapsus$ Hacker Joyride
Trends, Reports, Analysis