Browser Session Hijacking (T1185)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Browser Session Hijacking

Associated Tactics

  • Collection

Collection (TA0009)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques adversaries may use to gather information and the sources information is collected from that are relevant to following through on the adversary's objectives. Frequently, the next goal after collecting data is to either steal (exfiltrate) the data or to use the data to gain more information about the target environment. Common target sources include various drive types, browsers, audio, video, and email. Common collection methods include capturing screenshots and keyboard input.

View on ATT&CK

Procedure Examples

Description Source(s)
Wikipedia. (2017, October 28). Man-in-the-browser. Retrieved January 10, 2018. Wikipedia Man in the Browser
Mudge, R. (n.d.). Browser Pivoting. Retrieved January 10, 2018. Cobalt Strike Browser Pivot
De Tore, M., Warner, J. (2018, January 15). MALICIOUS CHROME EXTENSIONS ENABLE CRIMINALS TO IMPACT OVER HALF A MILLION USERS AND GLOBAL BUSINESSES. Retrieved January 17, 2018. ICEBRG Chrome Extensions
Strategic Cyber LLC. (2017, March 14). Cobalt Strike Manual. Retrieved May 24, 2017. cobaltstrike manual