Dylib Hijacking (T1574.004)

View on ATT&CK

In Playbook

Associated Tactics

  • Persistence
  • Privilege Escalation
  • Defense Evasion

Persistence (TA0003)

The adversary is trying to maintain their foothold. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that let them maintain their foothold on systems, such as replacing or hijacking legitimate code or adding startup code.

View on ATT&CK

Procedure Examples

Description Source(s)
Amanda Rousseau. (2020, April 4). MacOS Dylib Injection Workshop. Retrieved March 29, 2021. MalwareUnicorn macOS Dylib Injection MachO
Apple Inc.. (2012, July 7). Run-Path Dependent Libraries. Retrieved March 31, 2021. Apple Developer Doco Archive Run-Path
Patrick Wardle. (2015, March 1). Dylib Hijacking on OS X. Retrieved March 29, 2021. Wardle Dylib Hijacking OSX 2015
Patrick Wardle. (2015). Writing Bad @$$ Malware for OS X. Retrieved July 10, 2017. Writing Bad Malware for OSX
Patrick Wardle. (2019, July 2). Getting Root with Benign AppStore Apps. Retrieved March 31, 2021. Wardle Dylib Hijack Vulnerable Apps
Patrick Wardle. (2020, August 5). The Art of Mac Malware Volume 0x1: Analysis. Retrieved March 19, 2021. wardle artofmalware volume1
Wardle, P., Ross, C. (2017, September 21). Empire Project Dylib Hijack Vulnerability Scanner. Retrieved April 1, 2021. Github EmpireProject HijackScanner
Wardle, P., Ross, C. (2018, April 8). EmpireProject Create Dylib Hijacker. Retrieved April 1, 2021. Github EmpireProject CreateHijacker Dylib