Attackers incriminate a signed Oracle process for DLL hijacking, running Mimikatz

Wall-LARGEV2-1

Integrating application whitelisting into an OS’s security stack has forced attackers to find new ways to use their tools and infiltrate a target’s environment without getting detected. Take this incident observed in a Cybereason customer environment when DLL hijacking was used to run Mimikatz using a process that was signed and verified by Oracle.

Article Link: https://www.cybereason.com/blog/oracle-mimikatz-dll-hijacking