Common Information
Type | Value |
---|---|
Value |
Keylogging - T1417.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-16 | 6 | Iranian Hackers Deploy WezRat Malware in Attacks Targeting Israeli Organizations - CyberSRC | ||
Details | Website | 2024-11-14 | 13 | A Comprehensive Malware Analysis: Deobfuscating and Analyzing a Captive ReCAPTCHA Attack | ||
Details | Website | 2024-11-14 | 51 | Malware Spotlight: A Deep-Dive Analysis of WezRat | ||
Details | Website | 2024-11-14 | 49 | Malware Spotlight: A Deep-Dive Analysis of WezRat - Check Point Research | ||
Details | Website | 2024-11-14 | 1 | Spotlight on Iranian Cyber Group Emennet Pasargad’s Malware - Check Point Blog | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis | ||
Details | Website | 2024-11-13 | 55 | HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2024-11-13 | 0 | Authentication Vulnerabilities | ||
Details | Website | 2024-11-13 | 55 | HawkEye | PredatorPain | ||
Details | Website | 2024-11-11 | 4 | New Remcos RAT Variant Targets Windows Users Via Phishing | ||
Details | Website | 2024-11-11 | 3 | Cyber Briefing: 2024.11.11 | ||
Details | Website | 2024-11-11 | 2 | Researchers Detailed Credential Abuse Cycle | ||
Details | Website | 2024-11-11 | 0 | Wat is malware? | ||
Details | Website | 2024-11-10 | 6 | Recent Keylogger Attributed to North Korean Group Andariel Analyzed Through A Hybrid Analysis Perspective | CTF导航 | ||
Details | Website | 2024-11-08 | 3 | How to Create Your Own Website Vulnerability Scanner | ||
Details | Website | 2024-11-08 | 2 | Metasploit Guide :- Main weapon of Hackers | ||
Details | Website | 2024-11-07 | 63 | Weekly Intelligence Report - 08 Nov 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-11-07 | 4 | Essential Terms for Cybersecurity Conversations: Security and Key Tech Lingo A-Z | ||
Details | Website | 2024-11-07 | 0 | Using Human Risk Management to Detect and Thwart Cyberattacks - Cybersecurity Insiders | ||
Details | Website | 2024-11-07 | 19 | CrowdStrike’s work with the Democratic National Committee: Setting the record straight | ||
Details | Website | 2024-11-07 | 21 | Big Game Hunting: The Evolution of INDRIK SPIDER From Dridex Wire Fraud to BitPaymer Targeted Ransomware | ||
Details | Website | 2024-11-06 | 44 | GodFather Malware Targets 500 Banking & Crypto Apps Worldwide | ||
Details | Website | 2024-11-05 | 4 | The Credential Abuse Cycle: Theft, Trade, and Exploitation - ReliaQuest | ||
Details | Website | 2024-11-05 | 0 | Explosive Leaks! LoyLap and Grayscale Under Attack: New Threats on the Dark Web | ||
Details | Website | 2024-11-04 | 38 | Monthly Threat Actor Group Intelligence Report, September 2024 (KOR) |