prompt
stringclasses 508
values | procedure
stringlengths 20
478
|
---|---|
Credentials from Password Stores:Credentials from Web Browsers | Chaes can steal login credentials and stored financial information from the browser. |
Credentials from Password Stores:Credentials from Web Browsers | ChChes steals credentials stored inside Internet Explorer. |
Credentials from Password Stores:Credentials from Web Browsers | CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials. |
Credentials from Password Stores:Credentials from Web Browsers | CosmicDuke collects user credentials, including passwords, for various programs including Web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | Crimson contains a module to steal credentials from Web browsers on the victim machine. |
Credentials from Password Stores:Credentials from Web Browsers | Emotet has been observed dropping browser password grabber modules. |
Credentials from Password Stores:Credentials from Web Browsers | Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | It has used the Stealer One credential stealer to target web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | Grandoreiro can steal cookie data and credentials from Google Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | H1N1 dumps usernames and passwords from Firefox, Internet Explorer, and Outlook. |
Credentials from Password Stores:Credentials from Web Browsers | It has used a Mimikatz-based tool and a PowerShell script to steal passwords from Google Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords. |
Credentials from Password Stores:Credentials from Web Browsers | It used a browser plugin to steal passwords and sessions from Internet Explorer, Chrome, Opera, Firefox, Torch, and Yandex. |
Credentials from Password Stores:Credentials from Web Browsers | Javali can capture login credentials from open browsers including Firefox, Chrome, Internet Explorer, and Edge. |
Credentials from Password Stores:Credentials from Web Browsers | jRAT can capture passwords from common web browsers such as Internet Explorer, Google Chrome, and Firefox. |
Credentials from Password Stores:Credentials from Web Browsers | KeyBoy attempts to collect passwords from browsers. |
Credentials from Password Stores:Credentials from Web Browsers | KGH_SPY has the ability to steal data from the Chrome, Edge, Firefox, Thunderbird, and Opera browsers. |
Credentials from Password Stores:Credentials from Web Browsers | It has used browser extensions including Google Chrome to steal passwords and cookies from browsers. It has also used Nirsoft's WebBrowserPassView tool to dump the passwords obtained from victims. |
Credentials from Password Stores:Credentials from Web Browsers | KONNI can steal profiles (containing credential information) from Firefox, Chrome, and Opera. |
Credentials from Password Stores:Credentials from Web Browsers | It has obtained passwords and session tokens with the use of the Redline password stealer. |
Credentials from Password Stores:Credentials from Web Browsers | LaZagne can obtain credentials from web browsers such as Google Chrome, Internet Explorer, and Firefox. |
Credentials from Password Stores:Credentials from Web Browsers | It used several tools for retrieving login and password information, including LaZagne. |
Credentials from Password Stores:Credentials from Web Browsers | Lizar has a module to collect usernames and passwords stored in browsers. |
Credentials from Password Stores:Credentials from Web Browsers | Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | It collects stored credentials from several web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | Melcoz has the ability to steal credentials from web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI. |
Credentials from Password Stores:Credentials from Web Browsers | It used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims. |
Credentials from Password Stores:Credentials from Web Browsers | It has run tools including Browser64 to steal passwords saved in victim web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | NETWIRE has the ability to steal credentials from web browsers including Internet Explorer, Opera, Yandex, and Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | njRAT has a module that steals passwords saved in victim web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | It has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. It has also used tool named PICKPOCKET to dump passwords from web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | OLDBAIT collects credentials from Internet Explorer, Mozilla Firefox, and Eudora. |
Credentials from Password Stores:Credentials from Web Browsers | Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | It dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data. |
Credentials from Password Stores:Credentials from Web Browsers | PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator, Mozilla Firefox, Mozilla Thunderbird, and Internet Explorer. |
Credentials from Password Stores:Credentials from Web Browsers | PLEAD can harvest saved credentials from browsers such as Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox. |
Credentials from Password Stores:Credentials from Web Browsers | PoetRAT has used a Python tool named Browdec.exe to steal browser credentials. |
Credentials from Password Stores:Credentials from Web Browsers | A module in Prikormka gathers logins and passwords stored in applications on the victims, including Google Chrome, Mozilla Firefox, and several other browsers. |
Credentials from Password Stores:Credentials from Web Browsers | Proton gathers credentials for Google Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | Pupy can use Lazagne for harvesting credentials. |
Credentials from Password Stores:Credentials from Web Browsers | QakBot has collected usernames and passwords from Firefox and Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | QuasarRAT can obtain passwords from common web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | RainyDay can use tools to collect credentials from web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | RedLeaves can gather browser usernames and passwords. |
Credentials from Password Stores:Credentials from Web Browsers | ROKRAT can steal credentials stored in Web browsers by querying the sqlite database. |
Credentials from Password Stores:Credentials from Web Browsers | It's CredRaptor tool can collect saved passwords from various internet browsers. |
Credentials from Password Stores:Credentials from Web Browsers | SILENTTRINITY can collect clear text web credentials for Internet Explorer/Edge. |
Credentials from Password Stores:Credentials from Web Browsers | Smoke Loader searches for credentials stored from web browsers. |
Credentials from Password Stores:Credentials from Web Browsers | During the SolarWinds Compromise, It stole users' saved passwords from Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | It malware gathers passwords from multiple sources, including Internet Explorer, Firefox, and Chrome. |
Credentials from Password Stores:Credentials from Web Browsers | SUGARDUMP variants have harvested credentials from browsers such as Firefox, Chrome, Opera, and Edge. |
Credentials from Password Stores:Credentials from Web Browsers | It has used malware to gather credentials from Internet Explorer. |
Credentials from Password Stores:Credentials from Web Browsers | TrickBot can obtain passwords stored in files from web browsers such as Chrome, Firefox, Internet Explorer, and Microsoft Edge, sometimes using esentutl. |
Credentials from Password Stores:Credentials from Web Browsers | Trojan.Karagany can steal data and credentials from browsers. |
Credentials from Password Stores:Credentials from Web Browsers | TSCookie has the ability to steal saved passwords from the Internet Explorer, Edge, Firefox, and Chrome browsers. |
Credentials from Password Stores:Credentials from Web Browsers | Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine. |
Credentials from Password Stores:Credentials from Web Browsers | WarzoneRAT has the capability to grab passwords from numerous web browsers as well as from Outlook and Thunderbird email clients. |
Credentials from Password Stores:Credentials from Web Browsers | XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords. |
Credentials from Password Stores:Credentials from Web Browsers | Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files. |
Credentials from Password Stores:Credentials from Web Browsers | ItM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome. |
Credentials from Password Stores:Windows Credential Manager | KGH_SPY can collect credentials from the Windows Credential Manager. |
Credentials from Password Stores:Windows Credential Manager | LaZagne can obtain credentials from Vault files. |
Credentials from Password Stores:Windows Credential Manager | Lizar has a plugin that can retrieve credentials from Internet Explorer and Microsoft Edge using vaultcmd.exe and another that can collect RDP access credentials using the CredEnumerateW function. |
Credentials from Password Stores:Windows Credential Manager | Mimikatz contains functionality to acquire credentials from the Windows Credential Manager. |
Credentials from Password Stores:Windows Credential Manager | It has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager. |
Credentials from Password Stores:Windows Credential Manager | PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects. |
Credentials from Password Stores:Windows Credential Manager | RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials. |
Credentials from Password Stores:Windows Credential Manager | ROKRAT can steal credentials by leveraging the Windows Vault mechanism. |
Credentials from Password Stores:Windows Credential Manager | SILENTTRINITY can gather Windows Vault credentials. |
Credentials from Password Stores:Windows Credential Manager | It malware gathers passwords from the Windows Credential Vault. |
Credentials from Password Stores:Windows Credential Manager | It has gathered credentials from the Windows Credential Manager tool. |
Credentials from Password Stores:Windows Credential Manager | Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager. |
Credentials from Password Stores:Windows Credential Manager | It has used PowerShell cmdlet Invoke-WCMDump to enumerate Windows credentials in the Credential Manager in a compromised network. |
Credentials from Password Stores:Password Managers | It has used scripts to access credential information from the KeePass database. |
Credentials from Password Stores:Password Managers | It has accessed local password managers and databases to obtain further credentials from a compromised network. |
Credentials from Password Stores:Password Managers | MarkiRAT can gather information from the Keepass password manager. |
Credentials from Password Stores:Password Managers | During Operation Wocao, threat actors accessed and collected credentials from password managers. |
Credentials from Password Stores:Password Managers | Proton gathers credentials in files for 1password. |
Credentials from Password Stores:Password Managers | It obtained a KeePass database from a compromised host. |
Credentials from Password Stores:Password Managers | TrickBot can steal passwords from the KeePass open source password manager. |
Credentials from Password Stores:Cloud Secrets Management Stores | Pacu can retrieve secrets from the AWS Secrets Manager via the enum_secrets module. |
Forced Authentication | It used Template Injection to launch an authentication window for users to enter their credentials. |
Forced Authentication | It has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems. |
Forced Authentication | EnvyScout can use protocol handlers to coax the operating system to send NTLMv2 authentication responses to attacker-controlled infrastructure. |
Forge Web Credentials:Web Cookies | During the SolarWinds Compromise, It bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key. |
Forge Web Credentials:SAML Tokens | AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate. |
Forge Web Credentials:SAML Tokens | During the SolarWinds Compromise, It created tokens using compromised SAML signing certificates. |
Input Capture | It has utilized tools to capture mouse movements. |
Input Capture | Chaes has a module to perform any API hooking it desires. |
Input Capture | FlawedAmmyy can collect mouse events. |
Input Capture | Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host. |
Input Capture | Mafalda can conduct mouse event logging. |
Input Capture | metaMain can log mouse events. |
Input Capture:Keylogging | During the 2015 Ukraine Electric Power Attack, It gathered account credentials via a BlackEnergy keylogger plugin. |
Input Capture:Keylogging | ADVSTORESHELL can perform keylogging. |
Input Capture:Keylogging | Agent Tesla can log keystrokes on the victim’s machine. |
Input Capture:Keylogging | It has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system. |
Input Capture:Keylogging | AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine. |
Input Capture:Keylogging | It has used tools to perform keylogging. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.