Common Information
Type | Value |
---|---|
Value |
Keylogging - T1056.001 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.(Citation: Talos Kimsuky Nov 2021) Keylogging is the most prevalent type of input capture, with many different ways of intercepting keystrokes.(Citation: Adventures of a Keystroke) Some methods include: * Hooking API callbacks used for processing keystrokes. Unlike [Credential API Hooking](https://attack.mitre.org/techniques/T1056/004), this focuses solely on API functions intended for processing keystroke data. * Reading raw keystroke data from the hardware buffer. * Windows Registry modifications. * Custom drivers. * [Modify System Image](https://attack.mitre.org/techniques/T1601) may provide adversaries with hooks into the operating system of network devices to read raw keystrokes for login sessions.(Citation: Cisco Blog Legacy Device Attacks) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-09-09 | 0 | New Android SpyAgent Malware Uses OCR to Steal Crypto Wallet Recovery Keys - RedPacket Security | ||
Details | Website | 2024-09-09 | 1199 | RST TI Report Digest: 09 Sep 2024 | ||
Details | Website | 2024-09-09 | 33 | Threat Intelligence Report 3rd September – 9th September 2024 | ||
Details | Website | 2024-09-08 | 0 | New RAMBO attack steals data using RAM in air-gapped computers | ||
Details | Website | 2024-09-08 | 0 | Week 9 In Malware Analysis Fundamentals Workshop | ||
Details | Website | 2024-09-07 | 0 | New RAMBO attack steals data using RAM in air-gapped computers | ||
Details | Website | 2024-09-05 | 39 | BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar | ||
Details | Website | 2024-09-05 | 4 | Cyber Briefing: 2024.09.05 | ||
Details | Website | 2024-09-05 | 2 | HOW TO PREVENT LATERAL MOVEMENT IN A NETWORK | ||
Details | Website | 2024-09-05 | 73 | BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar | ||
Details | Website | 2024-09-04 | 2 | Demonstrating a simple XSS attack using a python script | ||
Details | Website | 2024-09-04 | 8 | North Korean Hackers Targets Job Seekers with Fake FreeConference App | ||
Details | Website | 2024-09-04 | 8 | North Korean Hackers Targets Job Seekers with Fake FreeConference App | ||
Details | Website | 2024-09-04 | 8 | North Korean Hackers Targets Job Seekers with Fake FreeConference App - RedPacket Security | ||
Details | Website | 2024-09-04 | 36 | The Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government - Cyble | ||
Details | Website | 2024-09-04 | 0 | Today’s Top Cyber Intelligence Highlights — Sep 04, 2024 | ||
Details | Website | 2024-09-04 | 1 | Meterpreter: the ultimate command guide for hackers | ||
Details | Website | 2024-09-03 | 20 | Trojan:Win64/Reflo.HNS!MTB Virus Analysis & Removal Guide– Gridinsoft Blog | ||
Details | Website | 2024-09-03 | 4 | Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users | ||
Details | Website | 2024-09-03 | 4 | Rocinante Trojan Poses as Banking Apps to Steal Sensitive Data from Brazilian Android Users - RedPacket Security | ||
Details | Website | 2024-09-02 | 15 | CYFIRMA RESEARCH : POWERSHELL KEYLOGGER - CYFIRMA | ||
Details | Website | 2024-09-02 | 456 | RST TI Report Digest: 02 Sep 2024 | ||
Details | Website | 2024-09-02 | 28 | Threat Intelligence Report 27th August – 2nd September 2024 | ||
Details | Website | 2024-09-01 | 2 | SCENARIO: Exploitation of ScreenConnect Authentication Bypass Vulnerability (CVE-2024–1709 &… | ||
Details | Website | 2024-08-29 | 24 | Monthly Threat Actor Group Intelligence Report, July 2024 (KOR) – Red Alert |