Esc
Path Interception by Search Order Hijacking - T1574.008
(ATT&CK® Technique)
Definition
Adversaries may execute their own malicious payloads by hijacking the search order used to load other programs. Because some programs do not call other programs using the full path, adversaries may place their own file in the directory where the calling program is located, causing the operating system to launch their malicious software at the request of the calling program.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.