<?xml version="1.0" encoding="utf-8"?><rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title>Ivanti Blog: Posts by </title><description /><language>en</language><atom:link rel="self" href="https://www.ivanti.com/en-gb/blog/authors/mariah-shotts/rss" /><link>https://www.ivanti.com/en-gb/blog/authors/mariah-shotts</link><item><guid isPermaLink="false">1e95ea64-34ca-4c22-9c3f-9d60cdf9995d</guid><link>https://www.ivanti.com/en-gb/blog/dll-hijacking-prevention</link><atom:author><atom:name>Mariah Shotts</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/mariah-shotts</atom:uri></atom:author><category>Endpoint &amp; Workspace Management</category><category>Security</category><title>DLL Hijacking: Risks, Real-World Examples and How to Prevent Attacks</title><description>&lt;p&gt;There’s been buzz around &lt;a href="https://www.cve.org/CVERecord?id=CVE-2025-56383" rel="noopener" target="_blank"&gt;CVE-2025-56383&lt;/a&gt; (published on Sept. 26, 2025), a hijacking vulnerability in Notepad++ v8.8.3 in which a DLL file can be swapped to execute malicious code.&lt;/p&gt;

&lt;p&gt;The CVE has been disputed by multiple parties, but we’re not here to comment on that. However, we are here to comment on DLL hijacking and discuss the very real threat that it poses to an organisation. Let’s look into what DLL hijacking is and what measures you can take to keep your DLLs safe.&lt;/p&gt;

&lt;h2&gt;What DLL hijacking is and how it happens&lt;/h2&gt;

&lt;p&gt;DLL hijacking (also known as a DLL preloading attack) is a security vulnerability where a legitimate and trusted Dynamic Link Library (DLL) file in a Windows application is replaced with a malicious one.&lt;/p&gt;

&lt;p&gt;This method exploits the way applications load DLL files, which contain code and data used by multiple programmes. By loading a malicious DLL, a threat actor can execute their own code with the same privileges as the legitimate application, leading to privilege escalation, persistence and defence evasion.&lt;/p&gt;

&lt;p&gt;When a programme starts, it often needs to load various DLLs to perform specific functions, typically from trusted system directories. However, if an application is not careful about where it looks for these DLLs, it might load a malicious DLL from an insecure or predictable location (i.e., the current working directory or a network share). This can happen if the application does not specify the full path to the DLL or if it searches for the DLL in a directory that can be accessed or modified by an attacker.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Flowchart showing DLL loading sequence. A purple box labeled “Application starts and requests DLL” connects to three folders: “Current Working Directory,” “Network Share,” and “System32.” The Current Working Directory points to a red box labeled “Malicious DLL” with a warning icon, while Network Share and System32 point to orange boxes labeled “Legitimate DLL” with checkmark icons." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram1-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;p&gt;While this type of attack is not new, it remains effective due to its simplicity. And although this specific issue pertains to Windows applications, it's important to call out that similar vulnerabilities can affect other operating systems (like Linux and macOS, which use dynamic loading for shared libraries).&lt;/p&gt;

&lt;p&gt;DLL hijacking introduces multiple security risks, including:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Data theft:&lt;/strong&gt; The malicious DLL can intercept and steal sensitive data, such as passwords or personal information.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Compromised systems:&lt;/strong&gt; The attacker can gain control over the system, potentially leading to further attacks or the installation of additional malware.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Malware:&lt;/strong&gt; The malicious DLL can act as a conduit for spreading malware, infecting other parts of the system or network.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A DLL can be hijacked in several different ways; here are some of the most common techniques:&lt;/p&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Insecure DLL search order:&lt;/strong&gt; Attackers place malicious DLLs in directories searched before the legitimate DLL's location.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Relative path manipulation:&lt;/strong&gt; Malicious DLLs are loaded when applications use relative paths.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;DLL redirection:&lt;/strong&gt; Techniques like path manipulation redirect the DLL loading process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Weak permissions:&lt;/strong&gt; Attackers replace legitimate DLLs with malicious ones in directories with weak permissions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Phantom DLL hijacking:&lt;/strong&gt; Attackers exploit applications loading non-existent DLLs by placing malicious DLLs with the same name in searched directories.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="Circular diagram divided into six colored segments around a center labeled “DLL Hijacking Techniques.” Segments include “Phantom DLL Hijacking,” “Insecure DLL Search Order,” “Relative Path Manipulation,” “DLL Redirection,” “Weak Permissions,” each with a small icon representing the concept." src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram2-dll-hijackcing.png"&gt;These potential vulnerabilities highlight the importance of secure coding practices and directory permission management when it comes to preventing this form of attack.&lt;/p&gt;

&lt;h2&gt;How to prevent DLL hijacking and keep your DLLs safe and secure&lt;/h2&gt;

&lt;p&gt;Although DLL hijacking remains a threat, there are best practices you can follow and implement to reduce your risk for a safer, more secure IT environment.&lt;/p&gt;

&lt;p&gt;&lt;img alt="Five concentric circles in gradient colors from orange to purple, representing security layers. The innermost circle reads “Secure DLL Loading,” followed by “Integrity Checks,” “User Permissions,” “App Control and Security Software,” and the outermost circle labeled “Patch Management.”" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/12/diagram3-dll-hijackcing.png"&gt;&lt;/p&gt;

&lt;h3&gt;Secure DLL loading:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Use full paths:&lt;/strong&gt; Always specify the full path to the DLL when loading it. This ensures that the application loads the DLL from a trusted location (and not from an insecure directory).&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Set the safe search path:&lt;/strong&gt; Use the SetDllDirectory function in Windows to add trusted directories to the search path and exclude insecure ones. This can help prevent the application from loading DLLs from unexpected locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;File integrity checks:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Digital signatures:&lt;/strong&gt; Ensure that DLLs are signed with a digital signature and verify the signature before loading the DLL. This can help confirm that the DLL has not been tampered with.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Hash verification:&lt;/strong&gt; Use cryptographic hash functions to verify the integrity of DLL files. If the hash of the DLL does not match the expected value, the file may have been modified.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;User permissions:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Least privilege principle:&lt;/strong&gt; Run applications with the least privilege necessary. This limits the potential damage of a DLL hijacking, as the malicious code will have fewer permissions to execute harmful actions.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;User Account Control (UAC):&lt;/strong&gt; Enable UAC on Windows systems to prompt users for permission before running applications with elevated privileges. This can help prevent unauthorised changes to system files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Application control and privilege management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Known and trusted applications:&lt;/strong&gt; Application control ensures that only known and trusted applications are launchable, removing the risk of unauthorised applications being introduced.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Privilege control:&lt;/strong&gt; Effective privilege management is crucial in preventing DLL hijacking. By ensuring that applications have the correct rights and privileges to launch, you limit the ability of unauthorised users to introduce malicious files. This control acts as a key barrier, restricting the access an attacker needs to exploit the DLL search mechanism and thereby enhancing the security of your environment.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Security software:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Antivirus and anti-Malware:&lt;/strong&gt; Use reputable antivirus and anti-malware software to detect and prevent the loading of malicious DLLs. These tools can scan for known malicious files and behaviours.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Intrusion Detection Systems (IDS):&lt;/strong&gt; Implement IDS to monitor for unusual activity, such as unexpected changes to DLL files or attempts to load DLLs from insecure locations.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;Patch management:&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Keep software updated:&lt;/strong&gt; Regularly update applications and operating systems with the latest security patches. Many DLL hijacking vulnerabilities are fixed via updates, so stay current to help protect against known threats.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Automated patching:&lt;/strong&gt; Use an &lt;a href="https://www.ivanti.com/en-gb/products/ivanti-neurons-for-patch-management"&gt;automated patch management tool&lt;/a&gt; to ensure that all systems are kept up to date without manual intervention. This reduces the window of opportunity for attackers to exploit known vulnerabilities, including those that could be used for DLL hijacking. This proactive approach helps maintain the integrity of your applications and operating systems, making it much harder for attackers to inject malicious DLLs.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;By implementing these best practices, you can significantly reduce the risk of DLL hijacking and enhance the overall security of your applications and systems.&lt;/p&gt;

&lt;h2&gt;Combine the right tools and tactics to prevent DLL hijackings&lt;/h2&gt;

&lt;p&gt;DLL hijacking has been a persistent form of attack for years, proving that it’s still effective and will therefore continue to be an issue for organisations.&lt;/p&gt;

&lt;p&gt;Future-proof your organisation using the best practices mentioned above combined with proven solutions like &lt;a href="https://www.ivanti.com/en-gb/products/application-control"&gt;Ivanti Neurons for App Control&lt;/a&gt; to help keep your DLLs secure. Capabilities like Trusted Ownership catch and deny a hijacked DLL from being executed by ensuring that ownership of the items matches your approved list of trusted owners.&lt;/p&gt;

&lt;p&gt;And, keep your apps up to date to limit exposure to known vulnerabilities. Remove the risk of human error by automating patching with &lt;a href="https://www.ivanti.com/en-gb/products/ivanti-neurons-for-patch-management"&gt;Ivanti Neurons for Patch Management&lt;/a&gt;, ensuring that systems are automatically updated and secured.&lt;/p&gt;
</description><pubDate>Wed, 17 Dec 2025 14:00:02 Z</pubDate></item><item><guid isPermaLink="false">0359ce51-897c-4cca-8e13-254e378129f7</guid><link>https://www.ivanti.com/en-gb/blog/windows-11-migration-strategy</link><atom:author><atom:name>Mariah Shotts</atom:name><atom:uri>https://www.ivanti.com/en-gb/blog/authors/mariah-shotts</atom:uri></atom:author><category>Endpoint &amp; Workspace Management</category><title>Windows 11 Migration: Ivanti's Customer Zero Journey with Win11 Upgrades</title><description>&lt;p&gt;Windows 11 offers enhanced security and a modern user interface, but the transition can be complex for large organisations, with logistical and employee buy-in challenges. Microsoft will end support for Windows 10 on October 14, 2025, so it's crucial to start planning and executing Windows 11 deployments now.&lt;/p&gt;

&lt;h2&gt;The need to migrate to Windows 11&lt;/h2&gt;

&lt;p&gt;Migrating to Windows 11 is essential for staying current, secure and efficient. It provides advanced security features like stronger encryption and improved threat detection, safeguarding your data and enhancing IT resilience. The user-friendly interface also streamlines daily tasks, boosting productivity. With Microsoft ending support for Windows 10 this year, upgrading can help organisations avoid increased security risks and potential downtime. According to &lt;a href="https://www.gartner.com/en/documents/6338779" rel="noopener" target="_blank"&gt;Gartner&lt;/a&gt;, many enterprises are opting to replace even compatible machines with new hardware to ensure optimal performance with Windows 11. Proactive planning ensures a smooth and seamless transition.&lt;/p&gt;

&lt;h2&gt;Ivanti’s use-case for Windows 10 to Windows 11 migration&lt;/h2&gt;

&lt;p&gt;At Ivanti, we’ve been successfully rolling out Windows 11 migrations since the beginning of 2025. Like many large organisations, this migration is something we’ve been discussing and planning for quite some time. The goal is to update every eligible machine in a timely manner and triage ineligible machines for further troubleshooting or replacement.&lt;/p&gt;

&lt;p&gt;To meet this goal, we prioritised using our own Ivanti Neurons platform solutions, which equipped us with the proactive tools and insights necessary for a successful Windows 11 deployment. Using a phased approach, we were able to identify and address issues coming back from early adopters and gather valuable feedback. Once we saw validation of our plan, we could gradually roll out the upgrade to the rest of the organisation, ensuring a smoother migration overall.&lt;/p&gt;

&lt;h2&gt;Potential challenges&lt;/h2&gt;

&lt;p&gt;Like any other company, we wanted to get ahead of any potential barriers to a successful migration.&lt;/p&gt;

&lt;h3&gt;Hardware compatibility and unknown devices&lt;/h3&gt;

&lt;p&gt;One of the biggest challenges in upgrading to Windows 11 is meeting the hardware requirements. Many existing devices may not satisfy Microsoft's strict criteria, limiting the number of eligible machines. This can be especially problematic for organisations with a mix of older hardware. To tackle this, Ivanti’s IT team used our discovery capabilities to perform a thorough inventory and assessment of all devices, identifying those that would need to be upgraded or replaced before starting the migration. You can’t migrate devices you don’t know about, which made a comprehensive view of our IT landscape a key first step.&lt;/p&gt;

&lt;h3&gt;End-user friction and disruptions to productivity&lt;/h3&gt;

&lt;p&gt;User resistance to new interfaces and features can be another barrier to success. Change can be daunting, and the new look and features of Windows 11 may intimidate users accustomed to older versions. OS upgrades can also cause disruptions to users’ work, causing frustrations and downtime. To minimise these issues, Ivanti’s IT team wanted to make sure that updates were happening at a time most convenient to the end user to avoid losing unsaved work or disrupting productivity in general.&lt;/p&gt;

&lt;h3&gt;Continuing security updates with extended support&lt;/h3&gt;

&lt;p&gt;Not every machine can immediately upgrade to Windows 11 due to hardware requirements. However, Ivanti’s extended support will allow us to continue Windows 10 security updates past October, keeping these devices protected and functional.&lt;/p&gt;

&lt;p&gt;Ivanti’s Extended Security Update (ESU) deployment streamlines the patching process, reduces IT workload and maintains compliance with regulations like GDPR, HIPAA, or PCI-DSS. Unpatched systems face over 1,200 vulnerabilities annually, and a data breach can cost an average of $4.45 million, according to &lt;a href="https://www.ibm.com/reports/data-breach" rel="noopener" target="_blank"&gt;IBM&lt;/a&gt;. We need to make sure that any devices that don’t update to Windows 11 are kept safe and secure from vulnerabilities.&lt;/p&gt;

&lt;p&gt;Extended support also helps us extend our device lifecycle for devices that aren’t quite ready to be replaced, or when budget constraints are a factor. According to Gartner, many enterprises are still delaying purchases despite the need to move from Windows 10 to Windows 11, extending the lifecycle of their existing equipment and seeking alternatives to maximise their budgets. Ivanti’s ESU solutions help extend the lifespan of these devices, avoiding the high costs of a full hardware refresh. This ensures seamless patching, minimises security risks and reduces manual IT effort, helping us avoid potential losses and disruptions.&lt;/p&gt;

&lt;h2&gt;Ivanti’s Windows 11 migration workflow&lt;/h2&gt;

&lt;p&gt;Ivanti Neurons allowed us to automate key elements of the migration, from the initial device assessment to the upgrade itself, streamlining each phase and allowing our IT team to concentrate on other mission-critical activities. In general, here is how the workflow for updating devices from Windows 10 to Windows 11 looks at Ivanti.&lt;/p&gt;

&lt;h3&gt;1. Preparation&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Identify Devices:&lt;/strong&gt; Create a group of Windows 10 devices that need to be upgraded.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Download Files:&lt;/strong&gt; Push necessary files to the devices, ensuring efficient data transfer by using ZIP files.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;2. Pre-Check&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Eligibility Check:&lt;/strong&gt; Run PowerShell scripts to verify if the device meets the hardware requirements for Windows 11.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Power Check:&lt;/strong&gt; Ensure the device is connected to A/C power.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;3. User Interaction&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Notification:&lt;/strong&gt; Use Teams bot integration to notify users about the upgrade and allow them to schedule it.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Consent:&lt;/strong&gt; Users provide consent for the upgrade via an interactive Teams message.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img alt="it notices" src="https://static.ivanti.com/sites/marketing/media/images/blog/2025/7/win11screenshot.png"&gt;&lt;/p&gt;

&lt;h3&gt;4. Upgrade Execution&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Run Upgrade:&lt;/strong&gt; Execute the Windows Update Assistant to perform the upgrade.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Monitor Progress:&lt;/strong&gt; Track the upgrade process and handle any errors or issues that arise.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;5. Post-Upgrade Actions&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Restart Device:&lt;/strong&gt; Prompt users to restart their devices to complete the upgrade.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Activation Check:&lt;/strong&gt; Verify that the device is activated with an enterprise licence key.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Additional Updates:&lt;/strong&gt; Apply any necessary Windows updates post-upgrade.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;6. Error Handling&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Automated Ticket Creation:&lt;/strong&gt; Use a bot to generate tickets for devices that fail the upgrade process.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Troubleshooting:&lt;/strong&gt; Enterprise services team handles cases where devices cannot be upgraded automatically.&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;7. Continuous Improvement&lt;/h3&gt;

&lt;ul&gt;
	&lt;li&gt;&lt;strong&gt;Refinement:&lt;/strong&gt; Break down the upgrade process into smaller automated steps to streamline operations.&lt;/li&gt;
	&lt;li&gt;&lt;strong&gt;Feedback:&lt;/strong&gt; Incorporate user feedback to improve the upgrade experience.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;This workflow ensures a smooth transition from Windows 10 to Windows 11 while minimising disruptions and handling exceptions efficiently. This process has been rolled out gradually, taking it one week at a time. It’s been thoughtful and intentional, working to build this process and workflow for the future by ensuring it’s flexible and modular. That way, we can revisit a similar process for the next generation of Windows whenever it comes.&lt;/p&gt;

&lt;h2&gt;Ready to start your Windows 11 migration?&lt;/h2&gt;

&lt;p&gt;Migrating to Windows 11 is essential for maintaining security, efficiency and compliance. Ivanti has leveraged our own solutions to automate key steps, gather user feedback and provide extended security updates for ineligible devices, all while ensuring a smooth transition that minimises end-user disruption and maximises IT efficiency.&lt;/p&gt;

&lt;p&gt;Ivanti’s approach and workflow not only addresses current challenges but also sets up a flexible and modular foundation for future OS upgrades.&lt;/p&gt;

&lt;p&gt;Ready to start your own Windows 11 migration? Learn how Ivanti Neurons can simplify and automate the process.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://www.ivanti.com/en-gb/ivanti-neurons"&gt;Explore Ivanti Neurons&lt;/a&gt;&lt;/p&gt;
</description><pubDate>Mon, 21 Jul 2025 15:46:23 Z</pubDate></item></channel></rss>