Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

US freight technology company puts its shipping system and customer data on the web

YouTube now offers a way for parents to block their kids from watching short videos

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Hackers exploit sideloading of c-ares DLLs to bypass security and deploy malware
Identity

Hackers exploit sideloading of c-ares DLLs to bypass security and deploy malware

userBy userJanuary 14, 2026No Comments5 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Security experts have detailed an active malware campaign that exploits a DLL sideloading vulnerability in legitimate binaries related to the open source c-ares library to bypass security controls and deliver a wide range of commodity Trojans and stealers.

“The attacker achieves evasion by combining the malicious libcares-2.dll with a signed version of the legitimate ahost.exe (often renamed) to execute code,” Trellix said in a report shared with The Hacker News. “This DLL sideloading technique allows malware to evade traditional signature-based security defenses.”

This campaign has been observed distributing a wide variety of malware, including Agent Tesla, CryptBot, Formbook, Lumma Stealer, Vidar Stealer, Remcos RAT, Quasar RAT, DCRat, and XWorm.

Targets of this malicious activity include employees in management positions in commercial and industrial sectors such as finance, procurement, supply chain, oil and gas, and import/export, with invitations written in Arabic, Spanish, Portuguese, Farsi, and English, suggesting that the attack is localized.

cyber security

The attack relies on placing a malicious version of the DLL in the same directory as the vulnerable binary, taking advantage of the fact that it is susceptible to search order hijacking to execute the contents of the malicious DLL in place of the legitimate DLL, giving the threat actor the ability to execute code. The “ahost.exe” executable used in the campaign is signed by GitKraken and is typically distributed as part of GitKraken’s desktop application.

Analysis of artifacts in VirusTotal reveals “RFQ_NO_04958_LG2049 pdf.exe”, “PO-069709-MQ02959-Order-S103509.exe”, “23RDJANUARY OVERDUE.INV.PDF.exe”, “Sales Agreement”, and others. po-00423-025_pdf.exe” and “Fatura da DHL.exe” demonstrate the use of invoice and request for quotation (RFQ) themes to trick users into opening.

“This malware attack highlights the growing threat of DLL sideloading attacks that exploit trusted signed utilities like GitKraken’s ahost.exe to bypass security defenses,” Trellix said. “By leveraging legitimate software and exploiting its DLL loading process, attackers can silently deploy powerful malware such as XWorm and DCRat, allowing persistent remote access and data theft.”

The disclosure comes after Trellix reported a spike in Facebook phishing scams that use browser-in-the-browser (BitB) technology to simulate Facebook’s authentication screen and trick unsuspecting users into entering their credentials. It works by creating a fake pop-up inside the victim’s legitimate browser window using an iframe element, making it virtually impossible to distinguish between genuine and fake login pages.

“Attack attacks often begin with a phishing email disguised as a communication from a law firm,” researcher Mark Joseph Marti said. “The emails typically contain a fake legal notice about the infringing video and include a hyperlink that appears to be a Facebook login link.”

As soon as victims click on the shortened URL, they are redirected to a fake Meta CAPTCHA prompt asking them to sign in to their Facebook account. This triggers a pop-up window that uses the BitB method to display a fake login screen designed to collect credentials.

Other variants of social engineering campaigns utilize phishing emails that claim copyright violations, unusual login warnings, imminent account shutdown due to suspicious activity, or potential security vulnerabilities. These messages are designed to create a false sense of urgency and lure victims to a page hosted on Netlify or Vercel to obtain their credentials. There is evidence to suggest that the phishing attack may have been ongoing since July 2025.

“This method takes advantage of users’ familiarity with authentication flows by creating a custom-built fake login pop-up window within the victim’s browser, making credential theft nearly impossible to detect visually,” Trellix said. “The key change lies in the exploitation of trusted infrastructure, leveraging legitimate cloud hosting services and URL shortening tools such as Netlify and Vercel to bypass traditional security filters and give phishing pages a false sense of security.”

This discovery coincides with the discovery of a multi-stage phishing campaign that leverages Python payloads and TryCloudflare tunnels to distribute AsyncRAT via Dropbox links pointing to ZIP archives containing Internet shortcut (URL) files. Campaign details were first documented by Forcepoint X-Labs in February 2025.

cyber security

“The initial payload, a Windows Script Host (WSH) file, was designed to download and execute additional malicious scripts hosted on WebDAV servers,” Trend Micro said. “These scripts facilitated the download of batch files and further payloads, ensuring a seamless and persistent infection routine.”

Notable aspects of this attack are the exploitation of Living-off-the-land (LotL) techniques using Windows Script Host, PowerShell, native utilities, and the exploitation of Cloudflare’s free tier infrastructure to host WebDAV servers and evade detection.

The script staged in the TryCloudflare domain is designed to install a Python environment, establish persistence via a Windows startup folder script, and inject AsyncRAT shellcode into the “explorer.exe” process. In parallel, a decoy PDF is displayed to the victim, fooling them into thinking that a legitimate document has been accessed.

“The AsyncRAT campaigns analyzed in this report demonstrate the growing sophistication of attackers who exploit legitimate services and open-source tools to evade detection and establish persistent remote access,” Trend Micro said. “By leveraging Python-based scripts and exploiting Cloudflare’s free tier infrastructure to host malicious payloads, the attackers were able to bypass traditional security controls and hide their activity on trusted domains.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePFAS-free versatile coating for metals, plastics and glass
Next Article Tesla will now only offer fully self-driving (with supervision) subscriptions
user
  • Website

Related Posts

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

January 14, 2026

AI agents are becoming a privilege escalation path

January 14, 2026

Fortinet fixes critical FortiSIEM flaw that allows unauthenticated remote code execution

January 14, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Researchers null-root over 550 Kimwolf and Aisuru botnet command servers

US freight technology company puts its shipping system and customer data on the web

YouTube now offers a way for parents to block their kids from watching short videos

AI agents are becoming a privilege escalation path

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.