Common Information
Type | Value |
---|---|
Value |
Keylogging - T1056.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.(Citation: Talos Kimsuky Nov 2021) Keylogging is the most prevalent type of input capture, with many different ways of intercepting keystrokes.(Citation: Adventures of a Keystroke) Some methods include: * Hooking API callbacks used for processing keystrokes. Unlike [Credential API Hooking](https://attack.mitre.org/techniques/T1056/004), this focuses solely on API functions intended for processing keystroke data. * Reading raw keystroke data from the hardware buffer. * Windows Registry modifications. * Custom drivers. * [Modify System Image](https://attack.mitre.org/techniques/T1601) may provide adversaries with hooks into the operating system of network devices to read raw keystrokes for login sessions.(Citation: Cisco Blog Legacy Device Attacks) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-16 | 7 | Malicious ads exploited Internet Explorer zero day to drop malware | ||
Details | Website | 2024-10-15 | 0 | New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT | ||
Details | Website | 2024-10-15 | 0 | New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT - RedPacket Security | ||
Details | Website | 2024-10-15 | 1 | ErrorFather Hackers Attacking Android Users To Gain Remote Control | ||
Details | Website | 2024-10-15 | 0 | Cerberus Android Banking Trojan Deployed in New Malicious Campaign | ||
Details | Website | 2024-10-15 | 0 | Over 200 malicious apps on Google Play downloaded millions of times | ||
Details | Website | 2024-10-14 | 4 | New Cerberus Android Malware Variant Evades Security Tools: Cyble | ||
Details | Website | 2024-10-14 | 1 | TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs | ||
Details | Website | 2024-10-14 | 55 | Hidden In Plain Sight: How ErrorFather Deploys Cerberus To Amplify Cyber Threats | ||
Details | Website | 2024-10-14 | 0 | ColdRoot Malware | ||
Details | Website | 2024-10-14 | 21 | Threat Intelligence Report 8th October – 14th October | ||
Details | Website | 2024-10-12 | 0 | Exploring Cyber Threats: Malware Stealer and the Password Recovery Tool LockPick | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium | ||
Details | Website | 2024-10-11 | 71 | Weekly Intelligence Report - 11 Oct 2024 | #ransomware | #cybercrime | National Cyber Security Consulting | ||
Details | Website | 2024-10-10 | 17 | 2024-10-03 Amnesia Stealer Samples | ||
Details | Website | 2024-10-10 | 29 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 36 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 33 | Malware by the (Bit)Bucket: Uncovering AsyncRAT | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, August 2024 (KOR) | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, July 2024 (ENG) – Red Alert | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, August 2024 (KOR) – Red Alert | ||
Details | Website | 2024-10-10 | 18 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-09 | 2 | N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware | ||
Details | Website | 2024-10-09 | 2 | N. Korean Hackers Use Fake Interviews to Infect Developers with Cross-Platform Malware | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting |