Prevalent Sub-techniques
T1574.001
DLL Search Order Hijacking
DLL Search Order Hijacking
#5
Sub-technique rank
7.8%
organizations affected
846
confirmed threats
Ranking fifth among sub-techniques, DLL Search Order Hijacking is popular among adversaries because it allows them to introduce malicious binaries in a way that can be exceedingly difficult to detect.