Skip Navigation
Get a Demo

Technique T1574

Hijack Execution Flow

This is Hijack Execution Flow’s first appearance in the Threat Detection Report, and its prevalence is due to threats leveraging its DLL Search Order Hijacking sub-technique, which made the list in 2020.


Technique rank


Organizations affected


Confirmed threats
Back to Top