Common Information
Type Value
Value
Keylogging - T1417.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available.
Details Published Attributes CTI Title
Details Website 2024-10-09 0 New BeaverTail Malware Targets Job Seekers via Fake Recruiters
Details Website 2024-10-09 5 Threat Trend Report on APT Attacks (South Korea) - September 2024 Major Issues on APT Attacks in South Korea - ASEC
Details Website 2024-10-09 36 Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware
Details Website 2024-10-05 0 Security Update: IBM X-Force Shows Hackers Using BEC to Steal Cloud Creds | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
Details Website 2024-10-04 0 Part-1 MITRE ATT&CK Tactic & Techniques & framework
Details Website 2024-10-03 4 Cross-Site Scripting (XSS) vulnerabilities
Details Website 2024-10-03 38 Decoy Manuals and Malicious Browser Extensions: A Closer Look at a Multi-Layered Threat
Details Website 2024-10-03 29 Legacy Threat: PlugX Builder/Controller Discovered in Open Directory
Details Website 2024-10-02 0 Admin Rights in Action: How Hackers Target Privileged Accounts
Details Website 2024-10-02 0 AI-Driven Cyber Heist: How Rhadamanthys Stealer is Targeting Your Crypto Wallets — No One is Safe
Details Website 2024-10-02 2 LetsDefend SOC Walkthrough | SOC166 — Javascript Code Detected in Requested URL
Details Website 2024-10-01 79 Key Group uses leaked builders of ransomware and wipers
Details Website 2024-09-28 2 Crypto Scam App Disguised as WalletConnect Steals $70K in Five-Month Campaign
Details Website 2024-09-28 0 TryHackMe | Unified Kill Chain
Details Website 2024-09-26 1 N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks
Details Website 2024-09-26 1 N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks - RedPacket Security
Details Website 2024-09-26 1 Supply Chain Attacks Targeting Korean Game Companies Using Valid Certificates - ASEC
Details Website 2024-09-26 5 China-linked APT group Salt Typhoon compromised some US ISPs
Details Website 2024-09-26 34 WalletConnect Scam: A Case Study in Crypto Drainer Tactics
Details Website 2024-09-26 34 WalletConnect Scam: A Case Study in Crypto Drainer Tactics - Check Point Research
Details Website 2024-09-26 2 Top 5 Essential Penetration Testing Tools: A Detailed Guide
Details Website 2024-09-26 20 Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy
Details Website 2024-09-26 20 Unraveling Sparkling Pisces’s Tool Set: KLogEXE and FPSpy
Details Website 2024-09-26 6 Unmasking XSS: How to Identify and Exploit Cross-Site Scripting Vulnerabilities
Details Website 2024-09-26 5 Intelligence Insights: September 2024