Clipboard Data (T1414)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Clipboard Data

Associated Tactics

  • Collection
  • Credential Access

Collection (TA0035)

The adversary is trying to gather data of interest to their goal. Collection consists of techniques used to identify and gather information, such as sensitive files, from a target network prior to exfiltration. This category also covers locations on a system or network where the adversary may look for information to exfiltrate.

View on ATT&CK

Procedure Examples

Description Source(s)
Android Developers. (n.d.). Privacy changes in Android 10. Retrieved September 11, 2019. Android 10 Privacy Changes
Apple Developer. (n.d.). UIPasteboard. Retrieved April 1, 2022. UIPPasteboard
Fahl, S, et al.. (2013). Hey, You, Get Off of My Clipboard. Retrieved September 12, 2024. Fahl-Clipboard
Pearce, G. (, January). Retrieved August 8, 2019. Github Capture Clipboard 2019
NIST Mobile Threat Catalogue