
New RoningLoader Campaign Uses DLL Side-Loading and Code Injection to Evade Detection
A threat actor known as DragonBreath has launched a stealthy campaign using a multi-stage malware loader called RoningLoader. The malware targets Chinese-speaking users by disguising itself as trusted software such as Google Chrome and Microsoft Teams. Its core strength lies in a layered approach to avoiding detection — combining DLL side-loading, code injection, and signed […] The post New RoningLoader Campaign Uses DLL Side-Loading and Code Injection to Evade Detection appeared first on Cyber Security News.