Esc
Hijack Execution Flow - T1574
(ATT&CK® Technique)
Definition
Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs. Hijacking execution flow can be for the purposes of persistence, since this hijacked execution may reoccur over time. Adversaries may also use these mechanisms to elevate privileges or evade defenses, such as application control or other restrictions on execution.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.