A DLL hijacking vulnerability exists in an older version of the Intel Rapid Storage Technology (Intel RST) software that could allow malicious programs to appear as a trusted program and thus bypass antivirus engines. DLLs, or dynamic-link libraries, are Microsoft Windows files that other programs load in order to execute various functions contained in the DLL library. When a DLL is missing from the executable folder, attackers can use this search behavior to load a malicious DLL instead. The vulnerability could have been avoided if the Intel software used the WinVerifyTrust function to verify the authenticity of the loaded DLL.
Source: https://www.bleepingcomputer.com/news/security/update-intels-rapid-storage-app-to-fix-bug-letting-malware-evade-av/

