T1056: Input Capture
View on MITRE ATT&CK | T1056 |
---|---|
Tactic(s) | Collection, Credential Access |
Associated CAPEC Patterns | Credential Prompt Impersonation (CAPEC-654) , Collect Data as Provided by Users (CAPEC-569) |
Data from MITRE ATT&CK®:
Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal system usage, users often provide credentials to various different locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. Credential API Hooking) or rely on deceiving the user into providing input into what they believe to be a genuine service (e.g. Web Portal Capture).
© 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.
Cyber Threat Graph Context
Explore how this ATT&CK Technique relates to the wider threat graph
Reporting on this Technique
Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign
The Insikt Group has observed the TAG-70 using cross-site scripting (XSS) vulnerabilities to target Roundcube webmail servers in Europe. The ...
How to detect this technique
MITRE ATT&CK Data Components