Common Information
Type | Value |
---|---|
Value |
Keylogging - T1417.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2010-11-11 | 10 | Our contribution to the public discussion about the German new ID card (nPA) | ||
Details | Website | 2009-07-07 | 0 | Virus Bulletin :: Keyloggers used to loot US county | ||
Details | Website | 2009-02-26 | 27 | Another Password Stealer hides as Bank of America video malware | ||
Details | Website | 2008-11-26 | 23 | Bank of America Demo Account - DO NOT CLICK | ||
Details | Website | 2008-11-06 | 26 | Yesterday's Obama Spammer Now Imitates Colonial Bank | ||
Details | Website | 2008-09-03 | 0 | Productive Botnets - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2007-08-28 | 0 | Refog Free Keylogger - KGB Key Logger Review - Darknet - Hacking Tools, Hacker News & Cyber Security | ||
Details | Website | 2007-03-20 | 41 | Gozi Trojan Threat Analysis |