By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
Computing

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

News Room
Last updated: 2026/01/20 at 9:43 AM
News Room Published 20 January 2026
Share
Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
SHARE

Ravie LakshmananJan 20, 2026Malware / Threat Intelligence

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads, likely with the intent to deploy a remote access trojan (RAT).

The activity delivers “weaponized files via Dynamic Link Library (DLL) sideloading, combined with a legitimate, open-source Python pen-testing script,” ReliaQuest said in a report shared with The Hacker News.

The attack involves approaching high-value individuals through messages sent on LinkedIn, establishing trust, and deceiving them into downloading a malicious WinRAR self-extracting archive (SFX). Once launched, the archive extracts four different components –

  • A legitimate open-source PDF reader application
  • A malicious DLL that’s sideloaded by the PDF reader
  • A portable executable (PE) of the Python interpreter
  • A RAR file that likely serves as a decoy
Cybersecurity

The infection chain gets activated when the PDF reader application is run, causing the rogue DLL to be sideloaded. The use of DLL side-loading has become an increasingly common technique adopted by threat actors to evade detection and conceal signs of malicious activity by taking advantage of legitimate processes.

Over the past week, at least three documented campaigns have leveraged DLL side-loading to deliver malware families tracked as LOTUSLITE and PDFSIDER, along with other commodity trojans and information stealers.

In the campaign observed by ReliaQuest, the sideloaded DLL is used to drop the Python interpreter onto the system and create a Windows Registry Run key that makes sure that the Python interpreter is automatically executed upon every login. The interpreter’s primary responsibility is to execute a Base64-encoded open-source shellcode that’s directly executed in memory to avoid leaving forensic artifacts on disk.

The final payload attempts to communicate with an external server, granting the attackers persistent remote access to the compromised host and exfiltrating data of interest.

The abuse of legitimate open-source tools, coupled with the use of phishing messages sent on social media platforms, shows that phishing attacks are not confined to emails alone and that alternative delivery methods can exploit security gaps to increase the odds of success and break into corporate environments.

ReliaQuest told The Hacker News that the campaign appears to be broad and opportunistic, with activity spanning various sectors and regions. “That said, because this activity plays out in direct messages, and social media platforms are typically less monitored than email, it’s difficult to quantify the full scale,” it added.

“This approach allows attackers to bypass detection and scale their operations with minimal effort while maintaining persistent control over compromised systems,” the cybersecurity company said. “Once inside, they can escalate privileges, move laterally across networks, and exfiltrate data.”

This is not the first time LinkedIn has been misused for targeted attacks. In recent years, multiple North Korean threat actors, including those linked to the CryptoCore and Contagious Interview campaigns, have singled out victims by contacting them on LinkedIn under the pretext of a job opportunity and convincing them to run a malicious project as part of a supposed assessment or code review.

Cybersecurity

In March 2025, Cofense also detailed a LinkedIn-themed phishing campaign that employs lures related to LinkedIn InMail notifications to get recipients to click on a “Read More” or “Reply To” button and download the remote desktop software developed by ConnectWise for gaining complete control over victim hosts.

“Social media platforms commonly used by businesses represent a gap in most organizations’ security posture,” ReliaQuest said. “Unlike email, where organizations tend to have security monitoring tools, social media private messages lack visibility and security controls, making them an attractive delivery channel for phishing campaigns.”

“Organizations must recognize social media as a critical attack surface for initial access and extend their defenses beyond email-centric controls.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article We’ve just lost our best chance at the next great compact phone We’ve just lost our best chance at the next great compact phone
Next Article Unlimited for /mo? Yes, with Tello’s new promo! Unlimited for $10/mo? Yes, with Tello’s new promo!
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Biomanufacturing startup Anzen Industries secures £2m – UKTN
Biomanufacturing startup Anzen Industries secures £2m – UKTN
News
Don’t settle for : Verizon outage credits can reportedly reach 0
Don’t settle for $20: Verizon outage credits can reportedly reach $200
Gadget
2 Professional Rappers From Sacramento, California
2 Professional Rappers From Sacramento, California
Gadget
OpenAI’s Sora Underscores the Growing Threat of Deepfakes
OpenAI’s Sora Underscores the Growing Threat of Deepfakes
Software

You Might also Like

Why Smart Glasses May Be the Biggest Developer Workflow Shift Since Dual Monitors | HackerNoon
Computing

Why Smart Glasses May Be the Biggest Developer Workflow Shift Since Dual Monitors | HackerNoon

12 Min Read
LLVM Adopts “Human In The Loop” Policy For AI/Tool-Assisted Contributions
Computing

LLVM Adopts “Human In The Loop” Policy For AI/Tool-Assisted Contributions

4 Min Read
Africa leads on private capital diversity, women still get less money
Computing

Africa leads on private capital diversity, women still get less money

9 Min Read
How to Analyze Call Sentiment With Open-Source NLP Libraries | HackerNoon
Computing

How to Analyze Call Sentiment With Open-Source NLP Libraries | HackerNoon

6 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?