Hackers Hijack ESET: ToddyCat Exploits DLL Flaw for Sneaky Malware Invasion
A sophisticated APT group, ToddyCat, exploited a DLL search order hijacking flaw in ESET products, CVE-2024-11859, to deploy malware. Kaspersky reports that attackers planted malicious DLLs to execute code. ESET has since released patches. Remember, folks, always update your software unless you want your computer to experience a “cat-astrophic” event!

Hot Take:
When cybersecurity companies like ESET and Kaspersky start playing “who’s got the scarier APT group” with their own products, you know it’s a bug’s life! It’s like the digital version of leaving your keys in the door while your house is full of expensive tech toys. ToddyCat might sound like a cute pet name, but it’s more like a digital Cheshire cat, grinning menacingly as it disappears into your system. Who knew that DLL hijacking could be the IT world’s version of a sneaky cat burglar?
Key Points:
- A vulnerability in ESET products, tracked as CVE-2024-11859, has been exploited by the ToddyCat APT group.
- The flaw involves DLL search order hijacking, allowing for malicious code execution with administrative privileges.
- ToddyCat used this bug to deploy TCESB, a tool that stealthily bypasses protection and monitoring tools.
- ESET has released fixes for the vulnerability, affecting nearly a dozen of their products.
- The attack required pre-existing administrator privileges, meaning the hackers were already halfway in the door.