Common Information
Type | Value |
---|---|
Value |
Keylogging - T1417.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-04 | 38 | Monthly Threat Actor Group Intelligence Report, September 2024 (KOR) – Red Alert | ||
Details | Website | 2024-11-04 | 24 | From Pyongyang to Your Payroll: The Rise of North Korean Remote Workers in the West | ||
Details | Website | 2024-11-04 | 4 | Recent Keylogger Attributed to North Korean Group Andariel Analyzed Through A Hybrid Analysis Perspective | ||
Details | Website | 2024-11-03 | 0 | Hardware Security — Protecting Against Side-Channel and Fault Injection Attacks | ||
Details | Website | 2024-11-03 | 1 | October 2024 Threat Trend Report on APT Attacks (South Korea) - ASEC | ||
Details | Website | 2024-11-01 | 62 | Weekly Intelligence Report - 01 Nov 2024 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting | ||
Details | Website | 2024-10-30 | 154 | Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T. | ||
Details | Website | 2024-10-30 | 1 | New PySilon RAT Abusing Discord Platform to Maintain Persistence | ||
Details | Website | 2024-10-29 | 28 | Monthly Threat Actor Group Intelligence Report, August 2024 (ENG) – Red Alert | ||
Details | Website | 2024-10-28 | 2 | Russian Espionage Group Targets Ukrainian Military with Malware via Telegram | ||
Details | Website | 2024-10-28 | 2 | Russian Espionage Group Targets Ukrainian Military with Malware via Telegram - RedPacket Security | ||
Details | Website | 2024-10-28 | 0 | LoyLap Database Leak, New Jason RAT, and Supercell Exploit for Sale on Dark Web - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2024-10-28 | 2 | LoyLap Database Leak, New Jason RAT, and Supercell Exploit for Sale on Dark Web | ||
Details | Website | 2024-10-24 | 1 | Cerberus Malware: Understanding the Evolving Android Banking Trojan and the ErrorFather Campaign | ||
Details | Website | 2024-10-24 | 4 | Intelligence Insights: October 2024 | ||
Details | Website | 2024-10-22 | 0 | RAT Malware Operating via Discord Bot - ASEC | ||
Details | Website | 2024-10-22 | 1 | I “Has” Cybersecurity: Secure Boot vs Full Disk Encryption | ||
Details | Website | 2024-10-21 | 902 | RST TI Report Digest: 21 Oct 2024 | ||
Details | Website | 2024-10-20 | 0 | AI Conversations Exposed: The Token Length Vulnerability in ChatGPT, Copilot, and More | ||
Details | Website | 2024-10-19 | 1 | Firejail: Your First Line of Defense for Linux Application Security | ||
Details | Website | 2024-10-19 | 0 | 10 Smallest Hacker Gadgets and Their Ethical Uses in Penetration Testing | ||
Details | Website | 2024-10-19 | 0 | Multi-Factor Authentication: Your Digital Security Superhero | ||
Details | Website | 2024-10-18 | 44 | Weekly Intelligence Report - 18 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-16 | 5 | Cyber Briefing: 2024.10.16 | ||
Details | Website | 2024-10-16 | 7 | Malicious ads exploited Internet Explorer zero day to drop malware |