Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 331

DLL Hijacking

What is DLL Hijacking?

DLL HijackingAn attack that abuses Windows DLL search order to make a legitimate program load an attacker-controlled library instead of the intended one.


DLL hijacking (MITRE ATT&CK T1574.001) exploits the way Windows resolves dynamic-link libraries: when an application requests a DLL by name without a fully qualified path, the loader searches a predictable list of directories. An attacker who can write a malicious DLL into one of those higher-priority locations (the application directory, a writable PATH entry, or a side-by-side folder) gets their code executed in the context of a trusted, often signed process. The technique provides both execution and persistence, and bypasses many application-allowlist controls. Defenses include using fully qualified paths, enabling SafeDllSearchMode, applying WDAC/AppLocker rules, monitoring image loads with Sysmon event 7, and patching vulnerable installers.

Examples

  1. 01

    Dropping a malicious version.dll next to a signed installer that loads it from its own folder.

  2. 02

    Planting a DLL in a writable PATH directory to be loaded by a system service.

Frequently asked questions

What is DLL Hijacking?

An attack that abuses Windows DLL search order to make a legitimate program load an attacker-controlled library instead of the intended one. It belongs to the Attacks & Threats category of cybersecurity.

What does DLL Hijacking mean?

An attack that abuses Windows DLL search order to make a legitimate program load an attacker-controlled library instead of the intended one.

How does DLL Hijacking work?

DLL hijacking (MITRE ATT&CK T1574.001) exploits the way Windows resolves dynamic-link libraries: when an application requests a DLL by name without a fully qualified path, the loader searches a predictable list of directories. An attacker who can write a malicious DLL into one of those higher-priority locations (the application directory, a writable PATH entry, or a side-by-side folder) gets their code executed in the context of a trusted, often signed process. The technique provides both execution and persistence, and bypasses many application-allowlist controls. Defenses include using fully qualified paths, enabling SafeDllSearchMode, applying WDAC/AppLocker rules, monitoring image loads with Sysmon event 7, and patching vulnerable installers.

How do you defend against DLL Hijacking?

Defences for DLL Hijacking typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for DLL Hijacking?

Common alternative names include: DLL search-order hijacking, DLL preloading.

Related terms

See also