Critical Infrastructure Cybersecurity Framework
T1574Persistence5 Mitigations

Hijack Execution Flow

Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs.

Description

Adversaries may execute their own malicious payloads by hijacking the way operating systems run programs.

Available Mitigations

This technique can be mitigated using 5 documented security measures.

Privileged Account ManagementRestrict File and Directory PermissionsRestrict Library LoadingRestrict Registry PermissionsEnvironment Variable Permissions

Quick Info

Technique ID
T1574
Sub-Techniques
12
Mitigations
5

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.