Skip Navigation
Request Demo
 
 
 
 
 
 
 
 
 
 

Technique T1574

Hijack Execution Flow

This is Hijack Execution Flow’s first appearance in the Threat Detection Report, and its prevalence is due to threats leveraging its DLL Search Order Hijacking sub-technique, which made the list in 2020.

#10

Technique rank

8.4%

Organizations affected

859

Confirmed threats
 
Back to Top