Common Information
Type Value
Value
Keylogging - T1417.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may log user keystrokes to intercept credentials or other information from the user as the user types them. Some methods of keylogging include: * Masquerading as a legitimate third-party keyboard to record user keystrokes.(Citation: Zeltser-Keyboard) On both Android and iOS, users must explicitly authorize the use of third-party keyboard apps. Users should be advised to use extreme caution before granting this authorization when it is requested. * Abusing accessibility features. On Android, adversaries may abuse accessibility features to record keystrokes by registering an `AccessibilityService` class, overriding the `onAccessibilityEvent` method, and listening for the `AccessibilityEvent.TYPE_VIEW_TEXT_CHANGED` event type. The event object passed into the function will contain the data that the user typed. *Additional methods of keylogging may be possible if root access is available.
Details Published Attributes CTI Title
Details Website 2024-09-09 1199 RST TI Report Digest: 09 Sep 2024
Details Website 2024-09-09 33 Threat Intelligence Report 3rd September – 9th September 2024
Details Website 2024-09-08 0 New RAMBO attack steals data using RAM in air-gapped computers
Details Website 2024-09-08 0 Week 9 In Malware Analysis Fundamentals Workshop
Details Website 2024-09-07 0 New RAMBO attack steals data using RAM in air-gapped computers
Details Website 2024-09-05 39 BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
Details Website 2024-09-05 4 Cyber Briefing: 2024.09.05
Details Website 2024-09-05 2 HOW TO PREVENT LATERAL MOVEMENT IN A NETWORK
Details Website 2024-09-05 73 BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
Details Website 2024-09-04 2 Demonstrating a simple XSS attack using a python script
Details Website 2024-09-04 8 North Korean Hackers Targets Job Seekers with Fake FreeConference App
Details Website 2024-09-04 8 North Korean Hackers Targets Job Seekers with Fake FreeConference App
Details Website 2024-09-04 8 North Korean Hackers Targets Job Seekers with Fake FreeConference App - RedPacket Security
Details Website 2024-09-04 36 The Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government - Cyble
Details Website 2024-09-04 0 Today’s Top Cyber Intelligence Highlights — Sep 04, 2024
Details Website 2024-09-04 1 Meterpreter: the ultimate command guide for hackers
Details Website 2024-09-03 20 Trojan:Win64/Reflo.HNS!MTB Virus Analysis & Removal Guide– Gridinsoft Blog
Details Website 2024-09-03 4 Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users
Details Website 2024-09-03 4 Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users - RedPacket Security
Details Website 2024-09-02 15 CYFIRMA RESEARCH : POWERSHELL KEYLOGGER - CYFIRMA
Details Website 2024-09-02 456 RST TI Report Digest: 02 Sep 2024
Details Website 2024-09-02 28 Threat Intelligence Report 27th August – 2nd September 2024
Details Website 2024-09-01 2 SCENARIO: Exploitation of ScreenConnect Authentication Bypass Vulnerability (CVE-2024–1709 &…
Details Website 2024-08-29 24 Monthly Threat Actor Group Intelligence Report, July 2024 (KOR) – Red Alert
Details Website 2024-08-28 6 Rocinante: The trojan horse that wanted to fly