ToddyCat Hackers Exploit ESET Flaw to Launch Stealthy TCESB Attack

ToddyCat hackers exploit ESET flaw (CVE-2024-11859) to deploy stealthy TCESB malware using DLL hijacking and a vulnerable Dell driver.

Written By: Aminu Abdullahi
Apr 10, 2025
eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

A cybercriminal group linked to a series of attacks across Asia has been exploiting a security vulnerability in ESET’s security software to deploy a previously unknown malware strain called TCESB. This threat takes advantage of a flaw in ESET’s security tools to bypass defenses and silently execute malicious code on compromised devices.

The malware was linked to ToddyCat, a known advanced persistent threat (APT) group believed to be operating out of China.

According to a detailed analysis released by Andrey Gunkin, a researcher at cybersecurity company Kaspersky, the attackers found a way to run their malicious software using ESET’s command-line scanner (ecls), allowing it to avoid detection.

How the malware works

The hackers used a method called DLL Search Order Hijacking, a trick where Windows loads a fake version of a system file before the real one, as long as it’s in the same folder as the app trying to load it.

In this case, the malicious file was named version.dll—a real system file that usually handles version-checking tasks. But here, it carried the TCESB malware. ESET’s command-line scanner mistakenly loaded the fake version first, allowing the malware to enter the system under the guise of legitimate activity.

Kaspersky’s analysis revealed that TCESB is based on EDRSandBlast, an open-source tool known for evading endpoint detection systems. But ToddyCat didn’t just reuse it — they modified and extended it, making the new version even more capable of slipping under the radar.

To pull this off, the malware uses a technique known as BYOVD (Bring Your Own Vulnerable Driver). In simple terms, it installs an old, buggy Dell driver (DBUtilDrv2.sys, which contains the CVE-2021-36276 vulnerability) to gain access to the system.

Once installed, TCESB checks for a separate encrypted payload file every two seconds. When the attacker drops the payload into the system, the malware decrypts and executes it — all without triggering security software.

What has been done?

ESET was notified of the vulnerability in a responsible disclosure process. The flaw, now tracked as CVE-2024-11859, was patched by ESET in January after being reported. ESET confirmed this in a security advisory last week, rating it as a medium-severity issue with a CVSS score of 6.8. 

What this means for users and organizations

This attack reminds us that even trusted security software can be used against us. TCESB used a chain of old vulnerabilities and clever programming to hide in plain sight, making it hard to detect using traditional tools.

Security experts recommend that IT teams:

  • Update ESET software immediately to patch the vulnerability.
  • Monitor systems for old or vulnerable drivers.
  • Watch for unexpected downloads of Windows debug files, which could indicate that someone is probing deep into the system.

Kaspersky’s researchers also advise regularly checking all loaded system library files to ensure they are digitally signed and untampered.

AA

Aminu Abdullahi is an experienced B2B technology and finance writer. He has written for various publications, including TechRepublic, eWEEK, Enterprise Networking Planet, eSecurity Planet, CIO Insight, Enterprise Storage Forum, IT Business Edge, Webopedia, Software Pundit, Geekflare and more.

Recommended for you...

From LinkedIn to Lies: What a Job Scam Looks Like Now

Job scams are on the rise, targeting remote workers and new grads. Learn how to spot red flags, protect your info, and avoid falling victim.

Aminu Abdullahi
May 21, 2025
Fake AI Video Tools Spreading New “Noodlophile” Malware, Targets Thousands on Facebook

IT executive updating AI systems using green screen laptop, writing intricate binary code scripts. Technical support consultant using programming to

Aminu Abdullahi
May 12, 2025
RSA Conference 2025: Top Announcements and Key Takeaways from the Cybersecurity World’s Biggest Stage

Discover top RSA Conference 2025 highlights, from AI-powered security tools to identity protection, red teaming, mobile threats, and more.

NVIDIA: Agentic AI Is Reshaping Cybersecurity Defense

NVIDIA explores how agentic AI is transforming cybersecurity with real-time response, smarter automation, and new safeguards for secure deployment.

Aminu Abdullahi
Apr 30, 2025
eSecurity Planet Logo

eSecurity Planet is a leading resource for IT professionals at large enterprises who are actively researching cybersecurity vendors and latest trends. eSecurity Planet focuses on providing instruction for how to approach common security challenges, as well as informational deep-dives about advanced cybersecurity topics.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.