T1056: Input Capture

View on MITRE ATT&CK T1056
Tactic(s) Collection, Credential Access
Associated CAPEC Patterns Credential Prompt Impersonation (CAPEC-654) , Collect Data as Provided by Users (CAPEC-569)

Data from MITRE ATT&CK®:

Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal system usage, users often provide credentials to various different locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. Credential API Hooking) or rely on deceiving the user into providing input into what they believe to be a genuine service (e.g. Web Portal Capture).

© 2024 The MITRE Corporation. This work is reproduced and distributed with the permission of The MITRE Corporation.

Cyber Threat Graph Context

Explore how this ATT&CK Technique relates to the wider threat graph

Reporting on this Technique

Report

Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign

The Insikt Group has observed the TAG-70 using cross-site scripting (XSS) vulnerabilities to target Roundcube webmail servers in Europe. The ...

How to detect this technique

MITRE ATT&CK Data Components

Sigma Detections for this Technique