Adversaries may execute their own payloads by placing a malicious dynamic library (dylib) with an expected name in a path a victim application searches at runtime.
Sub-technique of
T1574
See: MITRE ATT&CK
Adversaries may execute their own payloads by placing a malicious dynamic library (dylib) with an expected name in a path a victim application searches at runtime.
Sub-technique of
T1574
See: MITRE ATT&CK