Input Injection (T1516)

View on ATT&CK

In Playbook

Technique & Subtechniques

  • Input Injection

Associated Tactics

  • Defense Evasion
  • Impact

Defense Evasion (TA0030)

The adversary is trying to avoid being detected. Defense evasion consists of techniques an adversary may use to evade detection or avoid other defenses. Sometimes these actions are the same as or variations of techniques in other categories that have the added benefit of subverting a particular defense or mitigation. Defense evasion may be considered a set of attributes the adversary applies to all other phases of the operation.

View on ATT&CK

Procedure Examples

Description Source(s)
Bitwarden. (n.d.). Auto-fill logins on Android . Retrieved September 15, 2019. bitwarden autofill logins
Lukáš Štefanko. (2018, December 11). Android Trojan steals money from PayPal accounts even with 2FA on. Retrieved July 11, 2019. android-trojan-steals-paypal-2fa
Vitor Ventura. (2019, April 9). Gustuff banking botnet targets Australia . Retrieved September 3, 2019. Talos Gustuff Apr 2019