How we trained an ML model to detect DLL hijacking
#1
Bug 
Quote:DLL hijacking is a common technique in which attackers replace a library called by a legitimate process with a malicious one. It is used by both creators of mass-impact malware, like stealers and banking Trojans, and by APT and cybercrime groups behind targeted attacks. In recent years, the number of DLL hijacking attacks has grown significantly.

Trend in the number of DLL hijacking attacks. 2023 data is taken as 100% (download)

We have observed this technique and its variations, like DLL sideloading, in targeted attacks on organizations in Russia, Africa, South Korea, and other countries and regions. Lumma, one of 2025’s most active stealers, uses this method for distribution. Threat actors trying to profit from popular applications, such as DeepSeek, also resort to DLL hijacking.

Detecting a DLL substitution attack is not easy because the library executes within the trusted address space of a legitimate process. So, to a security solution, this activity may look like a trusted process. Directing excessive attention to trusted processes can compromise overall system performance, so you have to strike a delicate balance between a sufficient level of security and sufficient convenience.
...
Developing a machine-learning model to detect DLL hijacking
Reply
#2
Detecting DLL hijacking with machine learning: real-world cases
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
UltraSearch 4.9.1
Version 4.9.1 I...harlan4096 — 10:46
Microsoft Edge 146.0.3856.59
Microsoft Edge 146...harlan4096 — 10:45
Google Chrome 146.0.7680.80
Google Chrome 146....harlan4096 — 10:39
Vivaldi 7.8 Build 3925.81
Vivaldi 7.8 Build ...harlan4096 — 10:38
Kaspersky\VPN\KSOS 21.25 (MR25) & KES 1...
harlan4096 — 10:37

[-]
Birthdays
Today's Birthdays
avatar (51)tersfargum
avatar (50)alfreExept
Upcoming Birthdays
avatar (44)gapedDow
avatar (38)snorydar
avatar (43)Hectorvot
avatar (51)knowhanPluts
avatar (39)Williamengiz
avatar (46)qaqapeti
avatar (44)battsourIonix
avatar (43)CedricSek
avatar (39)chasRex
avatar (33)uteluxix
avatar (47)piafcflene
avatar (39)Matthewkah
avatar (38)Charlesfibre
avatar (38)francisnj3
avatar (43)artmaGoork

[-]
Online Staff
There are no staff members currently online.

>