How DLL Sideloading Powers a New Wave of LinkedIn-Based Cyber Intrusions

Researchers Trace Sophisticated Malware Campaigns To LinkedIn Private Messages

The420 Web Desk
6 Min Read

Social media messaging, long treated as a peripheral risk compared with email, has become a primary vector for sophisticated cyber intrusions. Recent campaigns exploiting LinkedIn illustrate how attackers are adapting familiar tools and social trust to bypass corporate defenses.

A Quiet Shift in the Attack Surface

For years, corporate cybersecurity strategies have been built around email. Phishing detection, spam filters, and employee training programs have largely assumed that the inbox is where deception begins. But recent findings by cybersecurity researchers suggest that this assumption is increasingly outdated.

According to ReliaQuest, social media platforms commonly used by businesses now represent a significant and under-monitored gap in organizational security. Unlike email systems, which are typically integrated with logging, monitoring, and automated defenses, private messages on platforms like LinkedIn offer attackers a comparatively opaque channel. These messages often bypass the technical safeguards that companies rely on to detect suspicious behavior, making them an attractive delivery mechanism for phishing campaigns.

The shift is not merely technical but behavioral. Social media messages arrive in a context shaped by professional networking and trust, blurring the line between personal and corporate communication. In that ambiguity, attackers have found opportunity.

Certified Cyber Crime Investigator Course Launched by Centre for Police Technology

LinkedIn as a Vector for Targeted Deception

The misuse of LinkedIn for targeted cyberattacks is not new. In recent years, multiple North Korean–linked threat actors, including those associated with the CryptoCore and Contagious Interview campaigns, have used the platform to approach individuals under the guise of job opportunities. Victims were persuaded to run what appeared to be legitimate projects or code reviews, only to trigger the execution of malicious software.

More recently, cybersecurity researchers uncovered a new phishing campaign that again relies on LinkedIn’s private messaging system. The activity appears broad and opportunistic, spanning multiple sectors and regions, according to ReliaQuest. Because these interactions occur in direct messages — an area typically less monitored than email — researchers caution that the full scale of the campaign is difficult to quantify.

In March 2025, Cofense detailed a related LinkedIn-themed phishing effort that leveraged fake InMail notifications. Recipients were prompted to click “Read More” or “Reply To” buttons, which led them to download remote desktop software developed by ConnectWise. Once installed, the software granted attackers complete control over the victim’s system, underscoring how legitimate enterprise tools can be repurposed for malicious ends.

Weaponized Files and Familiar Software

The newly observed campaign relies on a delivery mechanism that blends legitimacy with stealth. High-value individuals are contacted via LinkedIn messages and encouraged, through rapport and persuasion, to download a malicious WinRAR self-extracting archive, known as an SFX file. On launch, the archive extracts four components: a legitimate open-source PDF reader, a malicious dynamic link library (DLL), a portable executable of the Python interpreter, and a decoy RAR file.

The infection chain is triggered when the PDF reader application is executed. At that point, the malicious DLL is sideloaded — a technique in which a legitimate application inadvertently loads a harmful library placed alongside it. DLL sideloading has become an increasingly common tactic among threat actors because it exploits trusted processes, helping malware evade detection.

Once sideloaded, the DLL drops the Python interpreter onto the system and establishes persistence by creating a Windows Registry Run key. This ensures that the interpreter executes automatically every time the user logs in. Its primary function is to run a Base64-encoded, open-source shellcode payload directly in memory, minimizing forensic artifacts on disk.

Researchers note that, over the past week alone, at least three documented campaigns have used DLL sideloading to distribute malware families tracked as LOTUSLITE and PDFSIDER, along with other commodity trojans and information stealers. The recurrence of the technique highlights its effectiveness in bypassing conventional security controls.

Persistence, Scale, and the Limits of Visibility

The final stage of the attack involves communication with an external server, granting attackers persistent remote access to the compromised host and enabling data exfiltration. Once inside, attackers can escalate privileges, move laterally across networks, and extract sensitive information, according to ReliaQuest.

What distinguishes this approach is not its novelty but its efficiency. By abusing legitimate open-source tools and trusted enterprise software, attackers can bypass detection while scaling operations with relatively little effort. The reliance on social media messaging further complicates defensive efforts, as these platforms often fall outside the scope of corporate security monitoring.

ReliaQuest emphasized that organizations must begin treating social media as a critical attack surface for initial access, rather than an ancillary risk. Email-centric controls, the company warned, are no longer sufficient on their own.

Stay Connected