Ausführungsablauf
1) Explore
[Determine suitable tasks to exploit] Determine what tasks exist on the target system that may result in a user providing their credentials.
Technik
- Determine what tasks prompt a user for their credentials.
2) Exploit
[Impersonate Task] Impersonate a legitimate task, either expected or unexpected, in an attempt to gain user credentials.
Technik
- Prompt a user for their credentials, while making the user believe the credential request is legitimate.
Voraussetzungen
The adversary must already have access to the target system via some means.
A legitimate task must exist that an adversary can impersonate to glean credentials.
Erforderliche Kenntnisse
Once an adversary has gained access to the target system, impersonating a credential prompt is not difficult.
Erforderliche Ressourcen
Malware or some other means to initially comprise the target system.
Additional malware to impersonate a legitimate credential prompt.
Gegenmaßnahmen
The only known mitigation to this attack is to avoid installing the malicious application on the device. However, to impersonate a running task the malicious application does need the GET_TASKS permission to be able to query the task list, and being suspicious of applications with that permission can help.
Verwandte Schwachstellen
| CWE-ID |
Name der Schwachstelle |
|
Improper Restriction of Rendered UI Layers or Frames The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain. |
Einreichung
| Name |
Organisation |
Datum |
Veröffentlichungsdatum |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
|
Änderungen
| Name |
Organisation |
Datum |
Kommentar |
| CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Description, Extended_Description |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |