ESET’s Epic Fail: Hackers Hijack Security Software to Sneak Malware Through the Backdoor
An APT group, ToddyCat, exploited an ESET flaw to stealthily execute malware, bypassing security like a ninja in a library. The vulnerability, CVE-2024-11859, allowed mischief through DLL hijacking. ESET patched the issue, but not before ToddyCat had a field day with their sneakiness.

Hot Take:
When it comes to cyber espionage, it’s always “ToddyCats” out of the bag! Once again, the feline-named APT shows us that the only thing scarier than a hacker with skills is a hacker with a toolkit named after a vulnerable DLL. ESET didn’t see this one coming, but at least they patched it before the vulnerability became the cyber equivalent of catnip for other malicious actors!
Key Points:
- ToddyCat APT exploited a vulnerability in ESET software for stealthy malware execution.
- The flaw, CVE-2024-11859, is a DLL Search Order Hijacking issue.
- The exploit involved a C++ tool called TCESB bypassing security measures.
- ESET patched the vulnerability in January 2025.
- BYOVD technique used to evade detection with a vulnerable Dell driver.
Already a member? Log in here