prompt
stringclasses
508 values
procedure
stringlengths
20
478
Credentials from Password Stores:Credentials from Web Browsers
Chaes can steal login credentials and stored financial information from the browser.
Credentials from Password Stores:Credentials from Web Browsers
ChChes steals credentials stored inside Internet Explorer.
Credentials from Password Stores:Credentials from Web Browsers
CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials.
Credentials from Password Stores:Credentials from Web Browsers
CosmicDuke collects user credentials, including passwords, for various programs including Web browsers.
Credentials from Password Stores:Credentials from Web Browsers
Crimson contains a module to steal credentials from Web browsers on the victim machine.
Credentials from Password Stores:Credentials from Web Browsers
Emotet has been observed dropping browser password grabber modules.
Credentials from Password Stores:Credentials from Web Browsers
Empire can use modules that extract passwords from common web browsers such as Firefox and Chrome.
Credentials from Password Stores:Credentials from Web Browsers
It has used the Stealer One credential stealer to target web browsers.
Credentials from Password Stores:Credentials from Web Browsers
Grandoreiro can steal cookie data and credentials from Google Chrome.
Credentials from Password Stores:Credentials from Web Browsers
H1N1 dumps usernames and passwords from Firefox, Internet Explorer, and Outlook.
Credentials from Password Stores:Credentials from Web Browsers
It has used a Mimikatz-based tool and a PowerShell script to steal passwords from Google Chrome.
Credentials from Password Stores:Credentials from Web Browsers
Imminent Monitor has a PasswordRecoveryPacket module for recovering browser passwords.
Credentials from Password Stores:Credentials from Web Browsers
It used a browser plugin to steal passwords and sessions from Internet Explorer, Chrome, Opera, Firefox, Torch, and Yandex.
Credentials from Password Stores:Credentials from Web Browsers
Javali can capture login credentials from open browsers including Firefox, Chrome, Internet Explorer, and Edge.
Credentials from Password Stores:Credentials from Web Browsers
jRAT can capture passwords from common web browsers such as Internet Explorer, Google Chrome, and Firefox.
Credentials from Password Stores:Credentials from Web Browsers
KeyBoy attempts to collect passwords from browsers.
Credentials from Password Stores:Credentials from Web Browsers
KGH_SPY has the ability to steal data from the Chrome, Edge, Firefox, Thunderbird, and Opera browsers.
Credentials from Password Stores:Credentials from Web Browsers
It has used browser extensions including Google Chrome to steal passwords and cookies from browsers. It has also used Nirsoft's WebBrowserPassView tool to dump the passwords obtained from victims.
Credentials from Password Stores:Credentials from Web Browsers
KONNI can steal profiles (containing credential information) from Firefox, Chrome, and Opera.
Credentials from Password Stores:Credentials from Web Browsers
It has obtained passwords and session tokens with the use of the Redline password stealer.
Credentials from Password Stores:Credentials from Web Browsers
LaZagne can obtain credentials from web browsers such as Google Chrome, Internet Explorer, and Firefox.
Credentials from Password Stores:Credentials from Web Browsers
It used several tools for retrieving login and password information, including LaZagne.
Credentials from Password Stores:Credentials from Web Browsers
Lizar has a module to collect usernames and passwords stored in browsers.
Credentials from Password Stores:Credentials from Web Browsers
Lokibot has demonstrated the ability to steal credentials from multiple applications and data sources including Safari and the Chromium and Mozilla Firefox-based web browsers.
Credentials from Password Stores:Credentials from Web Browsers
It collects stored credentials from several web browsers.
Credentials from Password Stores:Credentials from Web Browsers
Melcoz has the ability to steal credentials from web browsers.
Credentials from Password Stores:Credentials from Web Browsers
Mimikatz performs credential dumping to obtain account and password information useful in gaining access to additional systems and enterprise network resources. It contains functionality to acquire information about credentials in many ways, including from DPAPI.
Credentials from Password Stores:Credentials from Web Browsers
It used the public tool BrowserPasswordDump10 to dump passwords saved in browsers on victims.
Credentials from Password Stores:Credentials from Web Browsers
It has run tools including Browser64 to steal passwords saved in victim web browsers.
Credentials from Password Stores:Credentials from Web Browsers
NETWIRE has the ability to steal credentials from web browsers including Internet Explorer, Opera, Yandex, and Chrome.
Credentials from Password Stores:Credentials from Web Browsers
njRAT has a module that steals passwords saved in victim web browsers.
Credentials from Password Stores:Credentials from Web Browsers
It has used credential dumping tools such as LaZagne to steal credentials to accounts logged into the compromised system and to Outlook Web Access. It has also used tool named PICKPOCKET to dump passwords from web browsers.
Credentials from Password Stores:Credentials from Web Browsers
OLDBAIT collects credentials from Internet Explorer, Mozilla Firefox, and Eudora.
Credentials from Password Stores:Credentials from Web Browsers
Olympic Destroyer contains a module that tries to obtain stored credentials from web browsers.
Credentials from Password Stores:Credentials from Web Browsers
It dumped the login data database from \AppData\Local\Google\Chrome\User Data\Default\Login Data.
Credentials from Password Stores:Credentials from Web Browsers
PinchDuke steals credentials from compromised hosts. PinchDuke's credential stealing functionality is believed to be based on the source code of the Pinch credential stealing malware (also known as LdPinch). Credentials targeted by PinchDuke include ones associated with many sources such as Netscape Navigator, Mozilla Firefox, Mozilla Thunderbird, and Internet Explorer.
Credentials from Password Stores:Credentials from Web Browsers
PLEAD can harvest saved credentials from browsers such as Google Chrome, Microsoft Internet Explorer, and Mozilla Firefox.
Credentials from Password Stores:Credentials from Web Browsers
PoetRAT has used a Python tool named Browdec.exe to steal browser credentials.
Credentials from Password Stores:Credentials from Web Browsers
A module in Prikormka gathers logins and passwords stored in applications on the victims, including Google Chrome, Mozilla Firefox, and several other browsers.
Credentials from Password Stores:Credentials from Web Browsers
Proton gathers credentials for Google Chrome.
Credentials from Password Stores:Credentials from Web Browsers
Pupy can use Lazagne for harvesting credentials.
Credentials from Password Stores:Credentials from Web Browsers
QakBot has collected usernames and passwords from Firefox and Chrome.
Credentials from Password Stores:Credentials from Web Browsers
QuasarRAT can obtain passwords from common web browsers.
Credentials from Password Stores:Credentials from Web Browsers
RainyDay can use tools to collect credentials from web browsers.
Credentials from Password Stores:Credentials from Web Browsers
RedLeaves can gather browser usernames and passwords.
Credentials from Password Stores:Credentials from Web Browsers
ROKRAT can steal credentials stored in Web browsers by querying the sqlite database.
Credentials from Password Stores:Credentials from Web Browsers
It's CredRaptor tool can collect saved passwords from various internet browsers.
Credentials from Password Stores:Credentials from Web Browsers
SILENTTRINITY can collect clear text web credentials for Internet Explorer/Edge.
Credentials from Password Stores:Credentials from Web Browsers
Smoke Loader searches for credentials stored from web browsers.
Credentials from Password Stores:Credentials from Web Browsers
During the SolarWinds Compromise, It stole users' saved passwords from Chrome.
Credentials from Password Stores:Credentials from Web Browsers
It malware gathers passwords from multiple sources, including Internet Explorer, Firefox, and Chrome.
Credentials from Password Stores:Credentials from Web Browsers
SUGARDUMP variants have harvested credentials from browsers such as Firefox, Chrome, Opera, and Edge.
Credentials from Password Stores:Credentials from Web Browsers
It has used malware to gather credentials from Internet Explorer.
Credentials from Password Stores:Credentials from Web Browsers
TrickBot can obtain passwords stored in files from web browsers such as Chrome, Firefox, Internet Explorer, and Microsoft Edge, sometimes using esentutl.
Credentials from Password Stores:Credentials from Web Browsers
Trojan.Karagany can steal data and credentials from browsers.
Credentials from Password Stores:Credentials from Web Browsers
TSCookie has the ability to steal saved passwords from the Internet Explorer, Edge, Firefox, and Chrome browsers.
Credentials from Password Stores:Credentials from Web Browsers
Unknown Logger is capable of stealing usernames and passwords from browsers on the victim machine.
Credentials from Password Stores:Credentials from Web Browsers
WarzoneRAT has the capability to grab passwords from numerous web browsers as well as from Outlook and Thunderbird email clients.
Credentials from Password Stores:Credentials from Web Browsers
XAgentOSX contains the getFirefoxPassword function to attempt to locate Firefox passwords.
Credentials from Password Stores:Credentials from Web Browsers
Zebrocy has the capability to upload dumper tools that extract credentials from web browsers and store them in database files.
Credentials from Password Stores:Credentials from Web Browsers
ItM has used a tool to steal credentials from installed web browsers including Microsoft Internet Explorer and Google Chrome.
Credentials from Password Stores:Windows Credential Manager
KGH_SPY can collect credentials from the Windows Credential Manager.
Credentials from Password Stores:Windows Credential Manager
LaZagne can obtain credentials from Vault files.
Credentials from Password Stores:Windows Credential Manager
Lizar has a plugin that can retrieve credentials from Internet Explorer and Microsoft Edge using vaultcmd.exe and another that can collect RDP access credentials using the CredEnumerateW function.
Credentials from Password Stores:Windows Credential Manager
Mimikatz contains functionality to acquire credentials from the Windows Credential Manager.
Credentials from Password Stores:Windows Credential Manager
It has used credential dumping tool named VALUEVAULT to steal credentials from the Windows Credential Manager.
Credentials from Password Stores:Windows Credential Manager
PowerSploit contains a collection of Exfiltration modules that can harvest credentials from Windows vault credential objects.
Credentials from Password Stores:Windows Credential Manager
RainyDay can use the QuarksPwDump tool to obtain local passwords and domain cached credentials.
Credentials from Password Stores:Windows Credential Manager
ROKRAT can steal credentials by leveraging the Windows Vault mechanism.
Credentials from Password Stores:Windows Credential Manager
SILENTTRINITY can gather Windows Vault credentials.
Credentials from Password Stores:Windows Credential Manager
It malware gathers passwords from the Windows Credential Vault.
Credentials from Password Stores:Windows Credential Manager
It has gathered credentials from the Windows Credential Manager tool.
Credentials from Password Stores:Windows Credential Manager
Valak can use a .NET compiled module named exchgrabber to enumerate credentials from the Credential Manager.
Credentials from Password Stores:Windows Credential Manager
It has used PowerShell cmdlet Invoke-WCMDump to enumerate Windows credentials in the Credential Manager in a compromised network.
Credentials from Password Stores:Password Managers
It has used scripts to access credential information from the KeePass database.
Credentials from Password Stores:Password Managers
It has accessed local password managers and databases to obtain further credentials from a compromised network.
Credentials from Password Stores:Password Managers
MarkiRAT can gather information from the Keepass password manager.
Credentials from Password Stores:Password Managers
During Operation Wocao, threat actors accessed and collected credentials from password managers.
Credentials from Password Stores:Password Managers
Proton gathers credentials in files for 1password.
Credentials from Password Stores:Password Managers
It obtained a KeePass database from a compromised host.
Credentials from Password Stores:Password Managers
TrickBot can steal passwords from the KeePass open source password manager.
Credentials from Password Stores:Cloud Secrets Management Stores
Pacu can retrieve secrets from the AWS Secrets Manager via the enum_secrets module.
Forced Authentication
It used Template Injection to launch an authentication window for users to enter their credentials.
Forced Authentication
It has gathered hashed user credentials over SMB using spearphishing attachments with external resource links and by modifying .LNK file icon resources to collect credentials from virtualized systems.
Forced Authentication
EnvyScout can use protocol handlers to coax the operating system to send NTLMv2 authentication responses to attacker-controlled infrastructure.
Forge Web Credentials:Web Cookies
During the SolarWinds Compromise, It bypassed MFA set on OWA accounts by generating a cookie value from a previously stolen secret key.
Forge Web Credentials:SAML Tokens
AADInternals can be used to create SAML tokens using the AD Federated Services token signing certificate.
Forge Web Credentials:SAML Tokens
During the SolarWinds Compromise, It created tokens using compromised SAML signing certificates.
Input Capture
It has utilized tools to capture mouse movements.
Input Capture
Chaes has a module to perform any API hooking it desires.
Input Capture
FlawedAmmyy can collect mouse events.
Input Capture
Kobalos has used a compromised SSH client to capture the hostname, port, username and password used to establish an SSH connection from the compromised host.
Input Capture
Mafalda can conduct mouse event logging.
Input Capture
metaMain can log mouse events.
Input Capture:Keylogging
During the 2015 Ukraine Electric Power Attack, It gathered account credentials via a BlackEnergy keylogger plugin.
Input Capture:Keylogging
ADVSTORESHELL can perform keylogging.
Input Capture:Keylogging
Agent Tesla can log keystrokes on the victim’s machine.
Input Capture:Keylogging
It has used CWoolger and MPK, custom-developed malware, which recorded all keystrokes on an infected system.
Input Capture:Keylogging
AppleSeed can use GetKeyState and GetKeyboardState to capture keystrokes on the victim’s machine.
Input Capture:Keylogging
It has used tools to perform keylogging.