|
|
|
|
CAPEC-637: Collect Data from Clipboard |
Description The adversary exploits an application that allows for the copying of sensitive data or information by collecting information copied to the clipboard. Data copied to the clipboard can be accessed by other applications, such as malware built to exfiltrate or log clipboard contents on a periodic basis. In this way, the adversary aims to garner information to which they are unauthorized. Likelihood Of Attack Typical Severity Execution Flow Explore Find an application that allows copying sensititve data to clipboad: An adversary first needs to find an application that allows copying and pasting of sensitive information. This could be an application that prints out temporary passwords to the screen, private email addresses, or any other sensitive information or data
Experiment Target users of the application: An adversary will target users of the application in order to obtain the information in their clipboard on a periodic basic | Techniques |
|---|
| Install malware on a user's system designed to log clipboard contents periodically | | Get the user to click on a malicious link that will bring them to an application to log the contents of the clipboard |
Exploit Follow-up attack: Use any sensitive information found to carry out a follow-up attack
Prerequisites
| The adversary must have a means (i.e., a pre-installed tool or background process) by which to collect data from the clipboard and store it. That is, when the target copies data to the clipboard (e.g., to paste into another application), the adversary needs some means of capturing that data in a third location. |
Skills Required
[Level: High] To deploy a hidden process or malware on the system to automatically collect clipboard data. |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.| Scope | Impact | Likelihood |
|---|
Confidentiality | Read Data | |
Mitigations
| While copying and pasting of data with the clipboard is a legitimate and practical function, certain situations and context may require the disabling of this feature. Just as certain applications disable screenshot capability, applications that handle highly sensitive information should consider disabling copy and paste functionality. |
| Employ a robust identification and audit/blocking via using an allowlist of applications on your system. Malware may contain the functionality associated with this attack pattern. |
Taxonomy Mappings CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.Relevant to the ATT&CK taxonomy mapping (also see parent) | Entry ID | Entry Name |
|---|
| 1115 | Clipboard Data |
Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2018-07-31 (Version 2.12) | CAPEC Content Team | | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2019-09-30 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2020-07-30 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | | Updated Description, Mitigations, Related_Attack_Patterns | | 2021-10-21 (Version 3.6) | CAPEC Content Team | The MITRE Corporation | | Updated Execution_Flow |
More information is available — Please select a different filter.
|