TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Signed, Trusted, and Abused: Proxy Execution via WebView2

BHIS · 2026-04-15 · Read original ↗

ATT&CK techniques detected

8 predictions
T1055.001Dynamic-link Library Injection
91%
“dll exists outside of the sand - boxed application and is installed and loaded from a user - writable directory under % localappdata %. this means that it is possible to perform a traditional dll hijack attack that msedgewebview2. exe will load into its process ’ s memory when on…”
T1574.001DLL
89%
“and necessary for normal browser and webview2 operation. [ 1 ] where it gets interesting is while numerous apps rely on this dll, multiple copies of the dll may be installed in various places under the user ’ s % localappdata % folder, depending on the application. while some use…”
T1574.001DLL
75%
“##view2 is not designed in the same way. this means that despite their strengths, windows apps are still susceptible to dll sideloading because webview2 is susceptible to dll sideloading attacks. more specifically, this is due to a dll called domain _ actions. dll. the domain _ a…”
T1055.001Dynamic-link Library Injection
57%
“safeguards, smart app control, and clearer permission prompts — reducing risks from legacy installers, com add ‑ ins, dropped drivers, or third - party dependencies. in proxying your way to code execution – a different take on dll hijacking i talk about how these applications “ d…”
T1190Exploit Public-Facing Application
47%
“execution of the attacker ’ s payload, displaying the “ hello world ” message. this makes webview2 a high - value target for not only initial access but also persistence, as these applications are always running. to further illustrate the impact, the second example uses shellcode…”
T1071Application Layer Protocol
42%
“execution of the attacker ’ s payload, displaying the “ hello world ” message. this makes webview2 a high - value target for not only initial access but also persistence, as these applications are always running. to further illustrate the impact, the second example uses shellcode…”
T1053.005Scheduled Task
35%
“signed, trusted, and abused : proxy execution via webview2 signed, trusted, and abused : proxy execution via webview2 in today ’ s rapidly evolving digital landscape, windows and its ecosystem of applications are transforming faster than ever, often leaving the door open for new …”
T1055.001Dynamic-link Library Injection
35%
“signed, trusted, and abused : proxy execution via webview2 signed, trusted, and abused : proxy execution via webview2 in today ’ s rapidly evolving digital landscape, windows and its ecosystem of applications are transforming faster than ever, often leaving the door open for new …”

Summary

Proxy execution via WebView2 banner

An offensive security perspective on Microsoft Edge WebView2 Runtime, including architectural weaknesses, existing vulnerabilities, and exploitation methods.

The post Signed, Trusted, and Abused: Proxy Execution via WebView2 appeared first on Black Hills Information Security, Inc..