Technology NewsTechnology NewsTechnology News
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Reading: Hijack Loader Malware Expands Stealth Tactics
Share
Font ResizerAa
Technology NewsTechnology News
Font ResizerAa
Search
  • Computing
  • AI
  • Robotics
  • Cybersecurity
  • Electric Vehicle
  • Wearables
  • Gaming
  • Space
Follow US
  • Cookie Policy (EU)
  • Contact
  • About
© 2025 NEWSLINKER - Powered by LK SOFTWARE
Cybersecurity

Hijack Loader Malware Expands Stealth Tactics

Highlights

  • Hijack Loader malware enhances its anti-evasion tactics.

  • ANY.RUN detects malware using advanced YARA rules.

  • Modular payloads complicate detection and remediation efforts.

Ethan Moreno
Last updated: 21 May, 2024 - 8:22 pm 8:22 pm
Ethan Moreno 12 months ago
Share
SHARE

Hijack Loader malware has undergone significant updates, incorporating advanced anti-evasion techniques that pose new challenges for cybersecurity defenses. The malware, which first emerged in September 2023, has become the sixth most detected threat according to the ANY.RUN Trends Tracker. Its latest version demonstrates a more sophisticated approach by decrypting and parsing a PNG image to deliver its second-stage payload, showcasing a modular architecture designed for stealth. This evolution highlights the ongoing cat-and-mouse game between malware developers and security researchers.

Contents
Detection and Analysis MethodsTechniques for Stealth OperationsRange of PayloadsKey Takeaways for Users

ANY.RUN, founded in 2016, is a cybersecurity company that specializes in providing an interactive sandbox platform used by a vast number of cybersecurity professionals globally. The platform allows for real-time malware analysis, helping experts understand and respond to threats more effectively. ANY.RUN’s services are particularly valued for their ability to detect malware rapidly and provide in-depth insights into malicious behavior.

Comparative analyses of recent Hijack Loader malware updates reveal a marked improvement in its anti-evasion strategies. Previously, the malware had a simpler structure, making it easier to detect. However, the current version bypasses common detection methods like inline API hooking, adds exclusions for Windows Defender, and evades User Account Control. The use of process hollowing to inject malicious code into legitimate processes demonstrates a higher level of sophistication, increasing the difficulty for standard security measures to identify and neutralize the threat effectively.

Additional research indicates that the modular nature of Hijack Loader allows for a more flexible and harmful deployment of its payloads. The second-stage payloads now include various types of malware such as Amadey, Lumma Stealer, Meta Stealer, Raccoon Stealer V2, Remcos RAT, and Rhadamanthys. This flexibility not only broadens its impact but also complicates detection and remediation efforts. The introduction of seven new modules in early 2024 further underscores its rapid evolution and the growing threat it poses.

Detection and Analysis Methods

ANY.RUN sandbox utilizes YARA rules to detect Hijack Loader, providing detailed sessions to analyze the malware’s behavior. Researchers noted that in recent analysis sessions, the command and control servers’ inactivity prevented the download of the second-stage payload, highlighting the importance of active C2 servers for malware functionality.

Techniques for Stealth Operations

The malware employs several sophisticated techniques to avoid detection. It bypasses inline API hooking, adds exclusions for Windows Defender, evades User Account Control, and uses process hollowing to inject malicious code into legitimate processes. These methods significantly enhance its stealth capabilities, making traditional detection methods less effective.

Range of Payloads

Hijack Loader’s modular architecture allows it to deliver a variety of payloads. Commonly delivered payloads include Amadey, Lumma Stealer, Meta Stealer, Raccoon Stealer V2, Remcos RAT, and Rhadamanthys. This ability to deploy multiple types of malware makes Hijack Loader a versatile and dangerous threat.

Key Takeaways for Users

  • Strengthen defenses against process hollowing and API hooking techniques.
  • Regularly update security software to detect new modular payloads.
  • Monitor for unusual exclusions in security settings, especially Windows Defender.

The battle against Hijack Loader illustrates the ongoing struggle in cybersecurity to keep pace with evolving threats. The updated anti-evasion techniques and modular design of Hijack Loader reflect a significant step up in its capability to bypass traditional security measures. Security professionals must continuously enhance their detection strategies, focusing on behavioral analysis and real-time interaction to mitigate such threats effectively. As malware becomes more sophisticated, so too must the tools and techniques used to defend against it. Employing comprehensive, up-to-date security solutions and maintaining vigilance in monitoring suspicious activities are crucial in safeguarding systems from advanced malware like Hijack Loader.

You can follow us on Youtube, Telegram, Facebook, Linkedin, Twitter ( X ), Mastodon and Bluesky

You Might Also Like

Cyberattack Forces PowerSchool to Face Extortion Scandal

CrowdStrike Faces Workforce Reduction Amid Financial Shifts

Authorities Seize DDoS Platforms in Multi-National Operation

Trump Urges Colorado to Release Jailed Clerk Over Election Breach

Google Targets Vulnerabilities in May Security Update

Share This Article
Facebook Twitter Copy Link Print
Ethan Moreno
By Ethan Moreno
Ethan Moreno, a 35-year-old California resident, is a media graduate. Recognized for his extensive media knowledge and sharp editing skills, Ethan is a passionate professional dedicated to improving the accuracy and quality of news. Specializing in digital media, Moreno keeps abreast of technology, science and new media trends to shape content strategies.
Previous Article Memcyco Finds Brands Lacking in Fraud Protection
Next Article NASA Prepares for Moonwalk Simulations

Stay Connected

6.2kLike
8kFollow
2.3kSubscribe
1.7kFollow

Latest News

Mazda Partners with Tesla for Charging Standard Shift
Electric Vehicle
Trump Alters AI Chip Export Strategy, Reversing Biden Controls
AI
Solve Wordle’s Daily Puzzle with These Expert Tips
Gaming
US Automakers Boost Robot Deployment in 2024
Robotics
Uber Expands Autonomy Partnership with $100 Million Investment in WeRide
Robotics
NEWSLINKER – your premier source for the latest updates in ai, robotics, electric vehicle, gaming, and technology. We are dedicated to bringing you the most accurate, timely, and engaging content from across these dynamic industries. Join us on our journey of discovery and stay informed in this ever-evolving digital age.

ARTIFICAL INTELLIGENCE

  • Can Artificial Intelligence Achieve Consciousness?
  • What is Artificial Intelligence (AI)?
  • How does Artificial Intelligence Work?
  • Will AI Take Over the World?
  • What Is OpenAI?
  • What is Artifical General Intelligence?

ELECTRIC VEHICLE

  • What is Electric Vehicle in Simple Words?
  • How do Electric Cars Work?
  • What is the Advantage and Disadvantage of Electric Cars?
  • Is Electric Car the Future?

RESEARCH

  • Robotics Market Research & Report
  • Everything you need to know about IoT
  • What Is Wearable Technology?
  • What is FANUC Robotics?
  • What is Anthropic AI?
Technology NewsTechnology News
Follow US
About Us   -  Cookie Policy   -   Contact

© 2025 NEWSLINKER. Powered by LK SOFTWARE
Welcome Back!

Sign in to your account

Register Lost your password?