Common Information
Type | Value |
---|---|
Value |
Credentials from Web Browsers - T1503 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may acquire credentials from web browsers by reading files specific to the target browser. (Citation: Talos Olympic Destroyer 2018) Web browsers commonly save credentials such as website usernames and passwords so that they do not need to be entered manually in the future. Web browsers typically store the credentials in an encrypted format within a credential store; however, methods exist to extract plaintext credentials from web browsers. For example, on Windows systems, encrypted credentials may be obtained from Google Chrome by reading a database file, <code>AppData\Local\Google\Chrome\User Data\Default\Login Data</code> and executing a SQL query: <code>SELECT action_url, username_value, password_value FROM logins;</code>. The plaintext password can then be obtained by passing the encrypted credentials to the Windows API function <code>CryptUnprotectData</code>, which uses the victim’s cached logon credentials as the decryption key. (Citation: Microsoft CryptUnprotectData April 2018) Adversaries have executed similar procedures for common web browsers such as FireFox, Safari, Edge, etc. (Citation: Proofpoint Vega Credential Stealer May 2018)(Citation: FireEye HawkEye Malware July 2017) Adversaries may also acquire credentials by searching web browser process memory for patterns that commonly match credentials.(Citation: GitHub Mimikittenz July 2016) After acquiring credentials from web browsers, adversaries may attempt to recycle the credentials across different systems and/or accounts in order to expand access. This can result in significantly furthering an adversary's objective in cases where credentials gained from web browsers overlap with privileged accounts (e.g. domain administrator). |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-08 | 8 | SteelFox and Rhadamanthys Malware Use Copyright Scams, Driver Exploits to Target Victims - CyberSRC | ||
Details | Website | 2024-11-04 | 24 | From Pyongyang to Your Payroll: The Rise of North Korean Remote Workers in the West | ||
Details | Website | 2024-10-28 | 21 | Malware Trends Report: Q3, 2024 | ||
Details | Website | 2024-10-25 | 58 | HeptaX: Unauthorized RDP Connections For Cyberespionage Operations | ||
Details | Website | 2024-10-22 | 21 | Malware Trends Report: Q3, 2024 | ||
Details | Website | 2024-10-22 | 21 | Malware Trends Report: Q3, 2024 - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2024-10-17 | 16 | Dark Web Profile: Evil Corp - SOCRadar® Cyber Intelligence Inc. | ||
Details | Website | 2024-10-17 | 16 | Dark Web Profile: Evil Corp | ||
Details | Website | 2024-10-16 | 4 | 5 Techniques for Collecting Cyber Threat Intelligence | ||
Details | Website | 2024-10-16 | 4 | 5 Techniques for Collecting Cyber Threat Intelligence - RedPacket Security | ||
Details | Website | 2024-09-19 | 2 | New Brazilian-Linked SambaSpy Malware Targets Italian Users via Phishing Emails | ||
Details | Website | 2024-09-19 | 2 | New Brazilian-Linked SambaSpy Malware Targets Italian Users via Phishing Emails - RedPacket Security | ||
Details | Website | 2024-09-18 | 33 | How to Collect Threat Intelligence Using Search Parameters in TI Lookup | ||
Details | Website | 2024-09-12 | 71 | Crystal Rans0m: Emerging hybrid ransomware with stealer capabilities | ||
Details | Website | 2024-09-04 | 0 | The Hidden Threat: LummaC2 Trojan Stealer Infecting GitHub Projects | ||
Details | Website | 2024-09-04 | 36 | The Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government - Cyble | ||
Details | Website | 2024-08-30 | 17 | Snake Keylogger Attack Windows Using Weaponized Excel Doc | ||
Details | Website | 2024-08-29 | 6 | New Snake Keylogger Variant Slithers Into Phishing Campaigns | ||
Details | Website | 2024-08-28 | 27 | Deep Analysis of Snake Keylogger’s New Variant | FortiGuard Labs | ||
Details | Website | 2024-08-22 | 82 | Threat Tracking: Analysis of puNK-003’s Lilith RAT ported to AutoIt Script | ||
Details | Website | 2024-07-30 | 4 | Phishing targeting Polish SMBs continues via ModiLoader | ||
Details | Website | 2024-07-15 | 42 | CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks | ||
Details | Website | 2024-07-01 | 62 | Kimsuky deploys TRANSLATEXT to target South Korean academia | ||
Details | Website | 2024-04-04 | 67 | BlueDuck: an(other) Infostealer Coveting Digital Marketing Agencies’ Facebook Business Accounts | ||
Details | Website | 2024-03-20 | 18 | Rescoms rides waves of AceCryptor spam |