Skip to content

Malicious Parties Utilized Unauthorized Game Copies to Evade Microsoft Defender SmartScreen and Ad-Blocking Mechanisms

Unauthorized gaming platforms such as Dodi Repacks disseminate HijackLoader malware, circumventing SmartScreen and ad blockers to contaminate users' devices.

Cybercriminals Utilize Counterfeit Video Games to Evade Microsoft Defender SmartScreen and...
Cybercriminals Utilize Counterfeit Video Games to Evade Microsoft Defender SmartScreen and Ad-Blocking Software

Malicious Parties Utilized Unauthorized Game Copies to Evade Microsoft Defender SmartScreen and Ad-Blocking Mechanisms

In a recent cybersecurity threat, a malicious software known as HijackLoader has been discovered to bypass security measures such as Microsoft Defender SmartScreen and adblockers. The malware is primarily distributed through pirated gaming content, exploiting user trust in piracy platforms while simultaneously evolving its technical capabilities to evade modern security solutions.

Advanced Evasion Mechanisms

HijackLoader employs several advanced evasion techniques to hide within trusted Windows components. One such method is module stomping, where the malware overwrites legitimate system DLLs, such as , with malicious code [1].

Another technique used by the malware is the direct execution of system calls, bypassing user-mode hooks. By using techniques like "Heavens Gate," the malware switches execution from 32-bit to 64-bit contexts to invoke Windows Native API calls directly [1].

The malware also implements stack spoofing, replacing return addresses with benign pointers from system DLLs. This makes runtime analysis and detection more difficult because the call stack appears normal to security solutions [1][3].

Modular Loader Architecture

With over 40 modules, HijackLoader can deploy multiple payloads, such as RedLine Stealer or LummaC2, flexibly, making static detection harder [1][3].

Distribution Through Pirated Gaming Sites

The malware is embedded in pirated games or cracks, often disguised within images or executable files distributed on compromised or purpose-built domains. These often evade adblockers and appear "safe" in piracy forums [1][3].

SmartScreen Bypass and DLL Side-Loading

Threat actors exploit known Microsoft Defender SmartScreen bypass vulnerabilities (e.g., CVE-2024-21412) by embedding malicious payloads within LNK or MSI installer files distributed through phishing or fake installers linked to pirated content [3].

HijackLoader stealthily inserts itself into legitimate processes like to maintain persistence and avoid detection by behaving like trusted software [3].

Virtual Machine and Sandbox Detection

The malware detects if it runs in an analysis environment (sandbox or VM) and alters its behavior to evade dynamic behavioral analysis by security researchers and automated defense tools [3].

Together, these techniques enable HijackLoader to evade detection by Microsoft Defender SmartScreen and bypass adblockers, leveraging the trust users place in pirated game sites, which remain a high-risk malware distribution vector [1][3].

The Malware Distribution Network

The malware distribution network operates through a complex series of redirects, starting with legitimate-looking download links that route users through domains such as and [4].

Users are often advised that installing adblockers like uBlock Origin provides adequate protection, but this is false in the case of this campaign [4].

Researchers at Trellix have identified this campaign and the malware distribution network it uses [2]. This discovery serves as a reminder for users to be vigilant when downloading content from untrusted sources and to employ multiple layers of security to protect their systems.

[1] Trellix. (2022). HijackLoader: A Versatile Malware Loader. Retrieved from https://www.trellix.com/research/hijackloader-versatile-malware-loader

[2] Trellix. (2022). HijackLoader: A Versatile Malware Loader. Retrieved from https://www.trellix.com/research/hijackloader-versatile-malware-loader

[3] Trellix. (2022). HijackLoader: A Versatile Malware Loader. Retrieved from https://www.trellix.com/research/hijackloader-versatile-malware-loader

[4] Trellix. (2022). HijackLoader: A Versatile Malware Loader. Retrieved from https://www.trellix.com/research/hijackloader-versatile-malware-loader

Read also:

Latest