Common Information
Type Value
Value
Keylogging - T1056.001
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.(Citation: Talos Kimsuky Nov 2021) Keylogging is the most prevalent type of input capture, with many different ways of intercepting keystrokes.(Citation: Adventures of a Keystroke) Some methods include: * Hooking API callbacks used for processing keystrokes. Unlike [Credential API Hooking](https://attack.mitre.org/techniques/T1056/004), this focuses solely on API functions intended for processing keystroke data. * Reading raw keystroke data from the hardware buffer. * Windows Registry modifications. * Custom drivers. * [Modify System Image](https://attack.mitre.org/techniques/T1601) may provide adversaries with hooks into the operating system of network devices to read raw keystrokes for login sessions.(Citation: Cisco Blog Legacy Device Attacks)
Details Published Attributes CTI Title
Details Website 2011-12-21 24 Postcards from the post-XSS world
Details Website 2011-06-08 39 Le framework metasploit – 2/2 – Sec Team Blog
Details Website 2010-11-11 10 Our contribution to the public discussion about the German new ID card (nPA)
Details Website 2009-07-07 0 Virus Bulletin :: Keyloggers used to loot US county
Details Website 2009-02-26 27 Another Password Stealer hides as Bank of America video malware
Details Website 2008-11-26 23 Bank of America Demo Account - DO NOT CLICK
Details Website 2008-11-06 26 Yesterday's Obama Spammer Now Imitates Colonial Bank
Details Website 2008-09-03 0 Productive Botnets - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-08-28 0 Refog Free Keylogger - KGB Key Logger Review - Darknet - Hacking Tools, Hacker News & Cyber Security
Details Website 2007-03-20 41 Gozi Trojan Threat Analysis