New RoningLoader Campaign Uses DLL Side-Loading and Code Injection to Evade Detection

A threat actor known as DragonBreath has launched a stealthy campaign using a multi-stage malware loader called RoningLoader. The malware targets Chinese-speaking users by disguising itself as trusted software such as Google Chrome and Microsoft Teams. Its core strength lies in a layered approach to avoiding detection — combining DLL side-loading, code injection, and signed […]

The post New RoningLoader Campaign Uses DLL Side-Loading and Code Injection to Evade Detection appeared first on Cyber Security News.

This article has been indexed from Cyber Security News

Read the original article: