Common Information
Type Value
Value
Input Prompt - T1141
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task. Adversaries can mimic this functionality to prompt users for credentials with a normal-looking prompt. This type of prompt can be accomplished with AppleScript: <code>set thePassword to the text returned of (display dialog "AdobeUpdater needs permission to check for updates. Please authenticate." default answer "")</code> (Citation: OSX Keydnap malware) Adversaries can prompt a user for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite. (Citation: OSX Malware Exploits MacKeeper) Detection: This technique exploits users' tendencies to always supply credentials when prompted, which makes it very difficult to detect. Monitor process execution for unusual programs as well as AppleScript that could be used to prompt users for credentials. Platforms: macOS Data Sources: User interface, Process Monitoring Permissions Required: User
Details Published Attributes CTI Title
Details Website 2024-11-13 8 Mastering Prompt Injection Attacks: An In-Depth Guide to AI Security Vulnerabilities
Details Website 2024-11-04 22 Machine Learning Bug Bonanza - Exploiting ML Services
Details Website 2024-09-30 2 ASCWG Finals CTF 2024 Reverse Challenges
Details Website 2024-09-21 0 Adversarial Attacks in AI: How ChatGPT Can Be Hacked.
Details Website 2024-07-09 0 New AI Innovations that supercharge Data Protection
Details Website 2024-04-26 0 Accelerating incident response using generative AI
Details Website 2023-07-14 0 OWASP Top 10 for LLMs: An Overview with SOCRadar
Details Website 2023-06-26 2 Unravelling the Attack Surface of AI Systems
Details Website 2023-06-25 15 SOC Puppet Creation Guide
Details Website 2023-06-15 11 Reverse Engineering: Binary Security
Details Website 2023-04-03 2 ChatGPT, the AI Revolution, and the Security, Privacy and Ethical Implications
Details Website 2023-04-03 2 ChatGPT, the AI Revolution, and the Security, Privacy and Ethical Implications
Details Website 2023-03-12 0 Memory ExploTion (Exploit in Action)
Details Website 2022-12-14 2 ChatGPT – the impact on Web3, Web2 and online security – a viewpoint from Naoris – Global Security Mag Online
Details Website 2022-11-15 48 Phishing Campaign Targeting Indonesian BRI Bank Using SMS Stealer
Details Website 2022-06-07 5 Behind the Creation of Detector #1236 - Red Canary
Details Website 2022-05-16 17 Fake Mobile Apps Steal Facebook Credentials, Cryptocurrency-Related Keys
Details Website 2022-05-16 14 Fake Mobile Apps Steal Facebook Credentials, Cryptocurrency-Related Keys
Details Website 2022-03-16 92 Avira Labs Research Reveals Hydra Banking Trojan 2.0 targeting a wider network of German and Austrian banks
Details Website 2022-01-21 0 Codex Exposed Task Automation and Response Consistency
Details Website 2022-01-21 0 Codex Exposed Task Automation and Response Consistency
Details Website 2012-10-03 1 Grant H. - CSAW CTF: Exploitation 200