Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Home/Threats/RoningLoader Uses DLL Side-Loading & Code Campaign Injection
Threats

RoningLoader Uses DLL Side-Loading & Code Campaign Injection

A new stealthy campaign has been identified, attributed to the threat actor DragonBreath. This operation leverages a multi-stage malware loader, dubbed RoningLoader. Designed to target...

Emy Elsamnoudy
Emy Elsamnoudy
April 9, 2026 3 Min Read
7 0

A new stealthy campaign has been identified, attributed to the threat actor DragonBreath. This operation leverages a multi-stage malware loader, dubbed RoningLoader. Designed to target Chinese-speaking users, the malware cleverly disguises itself as legitimate software, including popular applications like Google Chrome and Microsoft Teams.

Its core strength lies in a layered approach to avoiding detection — combining DLL side-loading, code injection, and signed kernel drivers to disable security tools silently.

RoningLoader first appeared in threat intelligence reports in November 2025, when Elastic Security Labs documented its use against users running Chinese endpoint detection tools.

The malware spreads through trojanized NSIS installers — a legitimate installer framework that threat actors frequently abuse. When a victim opens one of these fake installers, it silently drops a malicious DLL and an encrypted file disguised as a PNG image.

That encrypted file carries shellcode that launches the next stage of the attack entirely in memory, leaving fewer traces on disk.

AttackIQ researchers identified the full scope of RoningLoader’s post-compromise behavior, mapping it against the MITRE ATT&CK framework.

The team released an emulation-based attack graph mirroring the tactics, techniques, and procedures used by DragonBreath during this campaign.

Their findings revealed a threat that is technically sophisticated and deliberately redundant — built to keep running even if one layer of evasion fails.

The impact of this campaign goes beyond simply loading malware. RoningLoader actively disables security products including Microsoft Defender, Kingsoft Internet Security, Tencent PC Manager, and Qihoo 360 Total Security.

It uses a legitimately signed kernel driver to kill these processes at the kernel level, bypassing normal user-mode protections entirely.

At the final stage, the attacker deploys a modified version of gh0st RAT, granting full remote access to the infected system for data theft, lateral movement, and long-term espionage.

DragonBreath, also tracked as APT-Q-27, has been active since at least 2020 and is linked to attacks on online gaming and gambling industries.

Its targets span China, Taiwan, Hong Kong, Japan, Singapore, and the Philippines. The group has steadily sharpened its methods, and RoningLoader stands as its most technically capable campaign to date.

Inside the Evasion Engine: How RoningLoader Hides Its Tracks

One of the most striking features of RoningLoader is how it chains multiple evasion techniques so that each layer backs up the next. This redundancy is intentional — if one method fails, the malware still has several others to fall back on.

The attack begins when the trojanized NSIS installer executes on the victim’s machine. It drops both a legitimate application and a hidden malicious binary side by side. The real software runs normally in the foreground while the malware executes quietly in the background.

This twin-installation technique keeps the user unsuspecting and makes the initial infection very hard to notice.

RoningLoader then performs DLL side-loading (T1574.002), tricking a trusted Windows executable into loading a rogue DLL in its place. Because the DLL runs under a signed and trusted process, most security tools treat it as normal.

The malware then injects code into regsvr32.exe — a native Windows utility — using CreateRemoteThread and LoadLibrary (T1055.001), pushing execution into high-privilege processes like TrustedInstaller.exe to conceal its activity further.

To gain elevated access, the malware enables SeDebugPrivilege through the AdjustTokenPrivilege API, allowing it to interact with protected processes it would normally be blocked from accessing.

It also disables User Account Control by modifying the Windows registry, stripping away a standard system defense.

RoningLoader then uses CreateToolhelp32Snapshot along with Process32FirstW and Process32NextW to scan all running processes, locate active antivirus tools, and shut them down before the final gh0st RAT payload is released.

Security teams should monitor for unusual DLL loads from trusted Windows executables and flag regsvr32.exe launching without direct user action.

Setting alerts on UAC registry modifications, unexpected service creation, and token changes is also strongly recommended.

Running regular security control validation against RoningLoader’s documented TTPs through adversarial emulation will help defenders find and close gaps before a real attack takes place.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareSecurityThreat

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Silver Fox Campaign Hides ValleyRAT in Fake Telegram

Next Post

Critical Chrome Vulnerabilities Allow Arbitrary Code Execution

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us