Menu Close

Security experts have disclosed details of an active malware campaign that’s exploiting a DLL side-loading vulnerability in a legitimate binary associated with the open-source c-ares library to bypass security controls and deliver a wide range of commodity trojans and stealers.
“Attackers achieve evasion by pairing a malicious libcares-2.dll with any signed version of the legitimate ahost.exe (

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

+ 72 = 75
Powered by MathCaptcha

screen tagSupport