Close Menu
  • Home
  • AI
  • Big Data
  • Cloud Computing
  • iOS Development
  • IoT
  • IT/ Cybersecurity
  • Tech
    • Nanotechnology
    • Green Technology
    • Apple
    • Software Development
    • Software Engineering

Subscribe to Updates

Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

    What's Hot

    SGLA criticizes California Governor Newsom for signing ‘flawed, rushed’ sweepstakes ban

    October 13, 2025

    Gesture Recognition for Busy Hands

    October 13, 2025

    Inside the ‘Let’s Break It Down’ Series for Network Newbies

    October 13, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Big Tee Tech Hub
    • Home
    • AI
    • Big Data
    • Cloud Computing
    • iOS Development
    • IoT
    • IT/ Cybersecurity
    • Tech
      • Nanotechnology
      • Green Technology
      • Apple
      • Software Development
      • Software Engineering
    Big Tee Tech Hub
    Home»IT/ Cybersecurity»GOLD BLADE remote DLL sideloading attack deploys RedLoader – Sophos News
    IT/ Cybersecurity

    GOLD BLADE remote DLL sideloading attack deploys RedLoader – Sophos News

    big tee tech hubBy big tee tech hubJuly 29, 2025003 Mins Read
    Share Facebook Twitter Pinterest Copy Link LinkedIn Tumblr Email Telegram WhatsApp
    Follow Us
    Google News Flipboard
    GOLD BLADE remote DLL sideloading attack deploys RedLoader – Sophos News
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Sophos analysts are investigating a new infection chain for the GOLD BLADE cybercriminal group’s custom RedLoader malware, which initiates command and control (C2) communications. The threat actors leverage a LNK file to remotely execute and sideload a benign executable, which loads the RedLoader stage 1 payload that is hosted on GOLD BLADE infrastructure. The threat actors previously used these techniques individually: the use of WebDAV to execute remotely hosted DLLs was observed in September 2024, and the sideloading of a renamed ADNotificationManager.exe file was observed in March 2025. However, the combination observed in July 2025 represents a method for initial execution that has not been publicly reported.

    Execution chain

    Figure 1 illustrates the execution chain. The attack starts with a threat actor sending a well-crafted cover letter PDF to a target via a third-party job site such as ‘indeed.com’.

    Chart showing the RedLoader execution chain that uses remote DLL sideloading via an attacker-controlled WebDAV server

    Figure 1: RedLoader execution chain. (Source: Sophos)

    1. A malicious link in the PDF downloads a ZIP archive to the victim’s system. The archive contains a LNK file that masquerades as a PDF.
    2. The LNK file executes conhost.exe.
    3. This executable leverages WebDAV to contact a CloudFlare domain (automatinghrservices[.] workers[.]dev). A renamed signed version of the Adobe ADNotificationManager.exe executable masquerades as a resume and is remotely hosted on the attacker-controlled server (dav[.]automatinghrservices[.]workers[.]dev @ SSL\DavWWWRoot\CV-APP-2012-68907872.exe). This file resides in the same directory as the RedLoader stage 1 DLL file (netutils.dll).
    4. Upon execution, the renamed benign executable remotely sideloads the malicious DLL (netutils.dll), marking the beginning of the RedLoader infection chain.
    5. RedLoader stage 1 creates a scheduled task named ‘BrowserQE\BrowserQE_’ on the victim’s system and downloads a standalone executable for stage 2 from ‘live[.]airemoteplant[.]workers[.]dev’. The use of a standalone executable deviates from the activity observed in September 2024 and resembles the infection chain that Trend Micro reported in March 2024.
    6. The scheduled task uses PCALua.exe and conhost.exe to execute RedLoader stage 2, a custom executable named ‘BrowserQE_.exe’. While this executable name is victim-specific, the SHA256 hash is consistent across all samples observed by Sophos analysts.
    7. RedLoader stage 2 communicates with its C2 server.

    Mitigations

    The July activity shows how threat actors can combine prior techniques to modify their attack chain and bypass defenses. GOLD BLADE continues to rely heavily on LNK files that impersonate other file types. Organizations can mitigate this threat by deploying a Software Restriction Policy Group Policy Object that blocks LNK file execution from common directories leveraged by malware. These directories include ‘C:\Users\*\Downloads\*.lnk’, ‘%AppDataLocal%\*.lnk’, and ‘%AppDataRoaming%\*.lnk’.

    The Sophos protections listed in Table 1 will address this activity.

    Name Description
    Evade_28k Blocks specific versions of adnotificationmanager.exe regardless of
    DLL name from DLL sideloading
    WIN-DET-EVADE-HEADLESS-CONHOST-EXECUTION-1 Identifies suspicious child processes of conhost.exe where the
    process path is not ‘\Windows\splwow64.exe’,
    ‘\Windows\System32\WerFault.exe’, or
    ‘\Windows\System32\conhost.exe’
    Troj/Agent-BLKU Static detection for RedLoader stage 2

    Table 1: Sophos countermeasures covering this threat.

    To mitigate exposure to this malware, organizations can use available controls to review and restrict access using the indicators listed in Table 2. The domains may contain malicious content, so consider the risks before opening them in a browser. A CSV file containing IoCs mentioned in is post is available from our Github repository.

    Indicator Type Context
    automatinghrservices[.]workers[.]dev Domain name GOLD BLADE C2 server
    quiet[.]msftlivecloudsrv[.]workers[.]dev Domain name GOLD BLADE C2 server
    live[.]airemoteplant[.]workers[.]dev Domain name GOLD BLADE C2 server
    netutils.dll Filename RedLoader stage 1 deployed by GOLD BLADE via remote DLL sideloading
    d302836c7df9ce8ac68a06b53263e2c685971781a48ce56b3b5a579c5bba10cc SHA256 hash RedLoader stage 1 deployed by GOLD BLADE via remote DLL sideloading
    f5203c7ac07087fd5029d83141982f0a5e78f169cdc4ab9fc097cc0e2981d926 SHA256 hash RedLoader stage 2 deployed by GOLD BLADE
    369acb06aac9492df4d174dbd31ebfb1e6e0c5f3 SHA1 hash RedLoader stage 2 deployed by GOLD BLADE

    Table 2: Indicators for this threat.



    Source link

    Attack BLADE deploys DLL Gold News RedLoader Remote sideloading Sophos
    Follow on Google News Follow on Flipboard
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    tonirufai
    big tee tech hub
    • Website

    Related Posts

    Inside the ‘Let’s Break It Down’ Series for Network Newbies

    October 13, 2025

    Trustwave Named a Leader in the IDC MarketScape:

    October 12, 2025

    WhatsApp Worm Targets Brazilian Banking Customers – Sophos News

    October 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Editors Picks

    SGLA criticizes California Governor Newsom for signing ‘flawed, rushed’ sweepstakes ban

    October 13, 2025

    Gesture Recognition for Busy Hands

    October 13, 2025

    Inside the ‘Let’s Break It Down’ Series for Network Newbies

    October 13, 2025

    SVS Engineers: Who are the people that test-drive your network?

    October 12, 2025
    Advertisement
    About Us
    About Us

    Welcome To big tee tech hub. Big tee tech hub is a Professional seo tools Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of seo tools, with a focus on dependability and tools. We’re working to turn our passion for seo tools into a booming online website. We hope you enjoy our seo tools as much as we enjoy offering them to you.

    Don't Miss!

    SGLA criticizes California Governor Newsom for signing ‘flawed, rushed’ sweepstakes ban

    October 13, 2025

    Gesture Recognition for Busy Hands

    October 13, 2025

    Subscribe to Updates

    Get the latest technology news from Bigteetechhub about IT, Cybersecurity and Big Data.

      • About Us
      • Contact Us
      • Disclaimer
      • Privacy Policy
      • Terms and Conditions
      © 2025 bigteetechhub.All Right Reserved

      Type above and press Enter to search. Press Esc to cancel.