GUI Input Capture (T1417.002)

View on ATT&CK

In Playbook

Technique & Subtechniques

Associated Tactics

  • Credential Access
  • Collection

Credential Access (TA0031)

The adversary is trying to steal account names, passwords, or other secrets that enable access to resources. Credential access represents techniques that can be used by adversaries to obtain access to or control over passwords, tokens, cryptographic keys, or other values that could be used by an adversary to gain unauthorized access to resources. Credential access allows the adversary to assume the identity of an account, with all of that account's permissions on the system and network, and makes it harder for defenders to detect the adversary. With sufficient access within a network, an adversary can create accounts for later use within the environment.

View on ATT&CK

Procedure Examples

Description Source(s)
A.P. Felt and D. Wagner. (2011, May 26). Phishing on Mobile Devices. Retrieved August 25, 2016. Felt-PhishingOnMobileDevices
Android Developers. (n.d.). Restrictions on starting activities from the background. Retrieved September 18, 2019. Android Background
Fratantonio, Y., et al.. (2017). Cloak & Dagger. Retrieved September 12, 2024. Cloak and Dagger
Group-IB. (2019, March 28). Group-IB uncovers Android Trojan named «Gustuff» capable of targeting more than 100 global banking apps, cryptocurrency and marketplace applications. Retrieved September 3, 2019. Group IB Gustuff Mar 2019
Lukáš Štefanko. (2016, July 7). Fake finance apps on Google Play target users from around the world. Retrieved September 24, 2018. eset-finance
R. Hassell. (2011, October 12-13). Exploiting Androids for Fun and Profit. Retrieved October 10, 2019. Hassell-ExploitingAndroid
Rahman, M.. (2019, May 8). Bubbles in Android Q will fully replace the overlay API in a future Android version. Retrieved September 18, 2019. XDA Bubbles
Ramirez, T.. (2017, May 25). ‘SAW’-ing through the UI: Android overlay malware and the System Alert Window permission explained. Retrieved September 18, 2019. NowSecure Android Overlay
ThreatFabric. (2019, August). Cerberus - A new banking Trojan from the underworld. Retrieved September 18, 2019. ThreatFabric Cerberus
Yair Amit. (2016, March 3). “Accessibility Clickjacking” – The Next Evolution in Android Malware that Impacts More Than 500 Million Devices. Retrieved December 21, 2016. Skycure-Accessibility
NIST Mobile Threat Catalogue