Common Information
Type | Value |
---|---|
Value |
Keylogging - T1417.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-15 | 0 | New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT | ||
Details | Website | 2024-10-15 | 0 | New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT - RedPacket Security | ||
Details | Website | 2024-10-15 | 1 | ErrorFather Hackers Attacking Android Users To Gain Remote Control | ||
Details | Website | 2024-10-15 | 0 | Cerberus Android Banking Trojan Deployed in New Malicious Campaign | ||
Details | Website | 2024-10-15 | 0 | Over 200 malicious apps on Google Play downloaded millions of times | ||
Details | Website | 2024-10-14 | 4 | New Cerberus Android Malware Variant Evades Security Tools: Cyble | ||
Details | Website | 2024-10-14 | 1 | TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs | ||
Details | Website | 2024-10-14 | 55 | Hidden In Plain Sight: How ErrorFather Deploys Cerberus To Amplify Cyber Threats | ||
Details | Website | 2024-10-14 | 0 | ColdRoot Malware | ||
Details | Website | 2024-10-14 | 21 | Threat Intelligence Report 8th October – 14th October | ||
Details | Website | 2024-10-12 | 0 | Exploring Cyber Threats: Malware Stealer and the Password Recovery Tool LockPick | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium | ||
Details | Website | 2024-10-11 | 71 | Weekly Intelligence Report - 11 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-10 | 17 | 2024-10-03 Amnesia Stealer Samples | ||
Details | Website | 2024-10-10 | 29 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 36 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 33 | Malware by the (Bit)Bucket: Uncovering AsyncRAT | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, August 2024 (KOR) | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, July 2024 (ENG) – Red Alert | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, August 2024 (KOR) – Red Alert | ||
Details | Website | 2024-10-10 | 18 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-09 | 2 | N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware | ||
Details | Website | 2024-10-09 | 2 | N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting | ||
Details | Website | 2024-10-09 | 1 | North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and… |