Input Prompt (T1141)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Input Prompt

Associated Tactics

  • Credential Access

Credential Access (TA0006)

The adversary is trying to steal account names and passwords. Credential Access consists of techniques for stealing credentials like account names and passwords. Techniques used to get credentials include keylogging or credential dumping. Using legitimate credentials can give adversaries access to systems, make them harder to detect, and provide the opportunity to create more accounts to help achieve their goals.

View on ATT&CK

Procedure Examples

Description Source(s)
capec
Sergei Shevchenko. (2015, June 4). New Mac OS Malware Exploits Mackeeper. Retrieved July 3, 2017. OSX Malware Exploits MacKeeper
Foss, G. (2014, October 3). Do You Trust Your Computer?. Retrieved December 17, 2018. LogRhythm Do You Trust Oct 2014
Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017. OSX Keydnap malware
Nelson, M. (2015, January 21). Phishing for Credentials: If you want it, just ask!. Retrieved December 17, 2018. Enigma Phishing for Credentials Jan 2015