Common Information
Type Value
Value
Keylogging - T1417.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available.
Details Published Attributes CTI Title
Details Website 2010-11-11 10 Our contribution to the public discussion about the German new ID card (nPA)
Details Website 2009-07-07 0 Virus Bulletin :: Keyloggers used to loot US county
Details Website 2009-02-26 27 Another Password Stealer hides as Bank of America video malware
Details Website 2008-11-26 23 Bank of America Demo Account - DO NOT CLICK
Details Website 2008-11-06 26 Yesterday's Obama Spammer Now Imitates Colonial Bank
Details Website 2008-09-03 0 Productive Botnets - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-08-28 0 Refog Free Keylogger - KGB Key Logger Review - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-03-20 41 Gozi Trojan Threat Analysis