Technique T1574

Hijack Execution Flow

This is Hijack Execution Flow’s first appearance in the Threat Detection Report, and its prevalence is due to threats leveraging its DLL Search Order Hijacking sub-technique, which made the list in 2020.

#10

Technique rank

8.4%

Organizations affected

859

Confirmed threats