OneDrive Hijacking Vulnerability

OneDrive Hijacking Vulnerability image
You are here:

EXECUTIVE SUMMARY

Security researchers and incident responders are observing active abuse of Microsoft OneDrive binaries (e.g., OneDrive.exe / OneDriveUpdater.exe) to perform DLL side-loading: attackers place a malicious DLL beside a trusted OneDrive binary (or otherwise influence the DLL search path) so Windows loads the attacker’s DLL and executes malicious code in the context of a signed/legitimate process. This technique enables stealthy code execution, persistence, and defense evasion and has been observed in cryptojacking and broader intrusion activity.

  • Vulnerability: DLL vulnerability
  • Affected Sector: All sectors using Microsoft OneDrive in Windows environments
  • Affected Product: Microsoft OneDrive / OneDriveUpdater
  • Severity: High
  • Published Date: Nov 05, 2025

TECHNICAL DETAILS

  • Attacker obtains write access to a folder that will be searched by the OneDrive binary at load time (for example, user profile folders, mounted drives, or the same directory as the executable) and drops a malicious DLL whose name matches a legitimately resolved import.
  • Trigger / execution: When OneDrive.exe / OneDriveUpdater.exe starts or when the updater runs, Windows loader resolves imports and loads the malicious DLL instead of the expected system DLL. The malicious DLL runs inside the OneDrive process.
  • Post-execution activity: The DLL may spawn child processes, drop additional payloads, reach out to C2, install persistence artifacts, harvest credentials,…..

Download the Report

Date

Share

Previous Reports