Flusso di esecuzione
1) Explore
[Determine suitable tasks to exploit] Determine what tasks exist on the target system that may result in a user providing their credentials.
Tecnica
- Determine what tasks prompt a user for their credentials.
2) Exploit
[Impersonate Task] Impersonate a legitimate task, either expected or unexpected, in an attempt to gain user credentials.
Tecnica
- Prompt a user for their credentials, while making the user believe the credential request is legitimate.
Prerequisiti
The adversary must already have access to the target system via some means.
A legitimate task must exist that an adversary can impersonate to glean credentials.
Competenze richieste
Once an adversary has gained access to the target system, impersonating a credential prompt is not difficult.
Risorse richieste
Malware or some other means to initially comprise the target system.
Additional malware to impersonate a legitimate credential prompt.
Mitigazioni
The only known mitigation to this attack is to avoid installing the malicious application on the device. However, to impersonate a running task the malicious application does need the GET_TASKS permission to be able to query the task list, and being suspicious of applications with that permission can help.
Vulnerabilità correlate
| CWE-ID |
Nome della vulnerabilità |
|
Improper Restriction of Rendered UI Layers or Frames The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another application or domain. |
Invio
| Nome |
Organizzazione |
Data |
Data di rilascio |
| CAPEC Content Team |
The MITRE Corporation |
2020-07-30 +00:00 |
|
Modifiche
| Nome |
Organizzazione |
Data |
Commento |
| CAPEC Content Team |
The MITRE Corporation |
2022-02-22 +00:00 |
Updated Description, Extended_Description |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |