Over a decade ago, a much younger Patrick revealed how macOS (née OS X) was vulnerable to what had long been considered a Windows-only attack: dynamic library hijacking. At the time, he showed how simply planting malicious libraries in the right place could enable stealthy persistence, process injection, and even bypass core Apple security features.
Today, an older (and hopefully wiser) Patrick revisits the core concepts of that original research, explores how real-world macOS malware has abused the technique over the years, and examines how Apple responded with a series of aggressive mitigations aimed at stamping out such hijacks.
Finally, fast-forwarding to macOS 26, one burning question remains: is dynamic library hijacking finally dead, or still alive and well? Come for the history, stay for the live demos, detection tips, and yes, a few surprises.