<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dll-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dll-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 17 Mar 2026 15:03:41 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dll-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>GlassWorm Threat: DLL Injection and Chrome Hijacking</title><link>https://feed.craftedsignal.io/briefs/2026-03-glassworm/</link><pubDate>Tue, 17 Mar 2026 15:03:41 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-glassworm/</guid><description>The GlassWorm threat involves DLL injection and Chrome hijacking via COM abuse, confirming a full supply chain loop, potentially leading to data theft and system compromise.</description><content:encoded><![CDATA[<p>The GlassWorm threat involves sophisticated techniques like DLL injection and Chrome hijacking through COM abuse. Analysis confirms a full supply chain loop, indicating a well-coordinated and potentially widespread attack. The specifics of initial compromise and broader targeting remain unclear, but the technical capabilities displayed suggest a threat actor with significant resources and expertise. This threat necessitates immediate attention from detection engineering teams to identify and mitigate potential intrusions within their environments. The confirmation of a full supply chain loop also highlights the potential for widespread compromise affecting numerous downstream victims.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise occurs through an unidentified vector, potentially involving a supply chain attack.</li>
<li>The attacker establishes persistence on the system through an unknown method.</li>
<li>Malicious code is injected into a legitimate process using DLL injection.</li>
<li>The injected DLL targets Google Chrome.</li>
<li>The attacker abuses COM objects to hijack Chrome functionality.</li>
<li>The hijacked Chrome instance is used to steal user credentials and sensitive data.</li>
<li>Exfiltrated data is sent to attacker-controlled servers.</li>
<li>The attacker maintains a foothold for further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful GlassWorm attack can lead to the compromise of sensitive data, including user credentials, financial information, and proprietary data. The Chrome hijacking aspect allows attackers to monitor user activity, intercept communications, and potentially inject malicious content into web pages. The confirmation of a full supply chain loop suggests the potential for a large number of victims, depending on the scope and duration of the attack. The sector impact is currently unknown, but any organization relying on Chrome for sensitive operations is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious DLL loads into Chrome processes using the &ldquo;Detect Suspicious Chrome DLL Injection&rdquo; Sigma rule.</li>
<li>Investigate any unusual COM object activity associated with Chrome, focusing on unexpected object creation or modification (leverage existing COM auditing capabilities, if available).</li>
<li>Analyze network traffic for unexpected data exfiltration patterns originating from Chrome processes.</li>
<li>Implement strong endpoint detection and response (EDR) solutions to detect and prevent DLL injection attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dll-injection</category><category>chrome-hijacking</category><category>com-abuse</category><category>supply-chain</category></item><item><title>Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unsigned-dll-svchost/</link><pubDate>Tue, 09 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unsigned-dll-svchost/</guid><description>Adversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.</description><content:encoded><![CDATA[<p>Attackers may attempt to load malicious, unsigned DLLs into <code>svchost.exe</code>, a legitimate Windows service host process, to maintain persistence or escalate privileges. This technique abuses the shared service host process to execute arbitrary code with SYSTEM privileges. The <code>svchost.exe</code> process, which typically hosts multiple Windows services, can be targeted to load malicious DLLs from unusual file paths, potentially bypassing security measures that rely on code signing validation. This is especially concerning because <code>svchost.exe</code> is a trusted process, making detection more challenging. The loading of unsigned DLLs by <code>svchost.exe</code> from atypical directories is a strong indicator of potential malicious activity, as legitimate Windows services rarely load unsigned libraries from such locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An adversary gains initial access to the system through an undisclosed method (e.g., exploitation of a vulnerability or social engineering).</li>
<li>The attacker creates a malicious, unsigned DLL on the compromised system in a non-standard directory like <code>C:\ProgramData\</code>.</li>
<li>The attacker modifies the Windows Registry to configure a service hosted by <code>svchost.exe</code> to load the malicious DLL. This often involves manipulating service dependencies or service parameters.</li>
<li>The system is restarted, or the targeted service is manually restarted, causing <code>svchost.exe</code> to load the specified DLL.</li>
<li><code>svchost.exe</code> executes the code within the malicious DLL, now running with the privileges of the hosted service (typically SYSTEM).</li>
<li>The malicious DLL performs actions such as installing backdoors, escalating privileges further, or establishing command and control (C2) communication.</li>
<li>The attacker uses the established C2 channel to remotely control the compromised system, exfiltrate data, or perform other malicious activities.</li>
<li>The attacker maintains persistence on the system by ensuring the malicious DLL is loaded each time the service or system starts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain persistent access to the compromised system with elevated (SYSTEM) privileges. This can lead to complete system compromise, data theft, installation of backdoors, and lateral movement within the network. The use of <code>svchost.exe</code> as a host for malicious DLLs makes detection more difficult, allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect unsigned DLLs loaded by <code>svchost.exe</code>, focusing on the specified file paths and code signature status.</li>
<li>Examine <code>dll.Ext.relative_file_creation_time</code> to identify DLLs created shortly before being loaded to catch newly created malicious files.</li>
<li>Review and validate the legitimacy of all DLLs loaded by <code>svchost.exe</code>, focusing on those located in unusual paths.</li>
<li>Update endpoint detection and response (EDR) systems to specifically monitor for the loading of unsigned DLLs by system processes like <code>svchost.exe</code>.</li>
<li>Continuously update the exclusion list of known good DLL hashes to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>execution</category><category>windows</category><category>dll-injection</category></item><item><title>LSASS Loading Suspicious DLL</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</guid><description>Detection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows component that manages security policies and user authentication. Attackers often target LSASS to dump credentials, using techniques like injecting malicious DLLs. This detection focuses on identifying instances where LSASS loads a DLL that is either unsigned or not signed by a trusted vendor. The rule excludes known legitimate signatures and file hashes to reduce false positives. This activity is a strong indicator of credential access attempts, potentially leading to further compromise of the system and network. The signatures identified in the rule contain well-known software vendors like Microsoft, McAfee and Citrix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker elevates privileges to gain sufficient access to interact with the LSASS process.</li>
<li>The attacker drops a malicious DLL onto the system, often disguised as a legitimate file.</li>
<li>The attacker injects the malicious DLL into the LSASS process using techniques like Reflective DLL Injection.</li>
<li>LSASS loads the injected DLL, granting the attacker access to sensitive credentials stored in memory.</li>
<li>The malicious DLL dumps credentials, such as plaintext passwords or NTLM hashes.</li>
<li>The attacker uses the stolen credentials for lateral movement to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to credential compromise, allowing attackers to move laterally within the network, access sensitive data, and potentially achieve complete domain dominance. This can result in data breaches, financial losses, and reputational damage. The impact depends on the level of access associated with the compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the <code>LSASS Loading Untrusted DLL</code> Sigma rule to your SIEM to detect suspicious DLLs loaded by LSASS.</li>
<li>Investigate any alerts generated by the Sigma rule and review the loaded DLL&rsquo;s code signature and hash.</li>
<li>Block the identified SHA256 hashes listed in the IOC table to prevent the execution of known malicious DLLs.</li>
<li>Implement application whitelisting to restrict which DLLs can be loaded into LSASS.</li>
<li>Enable Sysmon process creation and image load logging to provide the necessary data for detection.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>dll-injection</category><category>windows</category></item></channel></rss>