Clipboard Data (T1115)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Clipboard Data

Associated Tactics

  • Collection

Collection (TA0009)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to either steal (exfiltrate) the data or to use the data to gain more information about the target environment. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.

View on ATT&CK

Procedure Examples

Description Source(s)
CISA. (2021, August 20). Alert (AA21-200B) Chinese State-Sponsored Cyber Operations: Observed TTPs. Retrieved June 21, 2022. CISA_AA21_200B
Maljic, T. (2020, April 16). Mining for malicious Ruby gems. Retrieved October 15, 2022. mining_ruby_reversinglabs
Microsoft, JasonGerend, et al. (2023, February 3). clip. Retrieved June 21, 2022. clip_win_server
Microsoft. (n.d.). About the Clipboard. Retrieved March 29, 2016. MSDN Clipboard
rvrsh3ll. (2016, May 18). Operating with EmPyre. Retrieved July 12, 2017. Operating with EmPyre