Input Capture: GUI Input Capture

Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: Bypass User Account Control).

Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.[1] This type of prompt can be used to collect credentials via various languages such as AppleScript[2][3][4] and PowerShell.[2][5][4] On Linux systems adversaries may launch dialog boxes prompting users for credentials from malicious shell scripts or the command line (i.e. Unix Shell).[4]

Adversaries may also mimic common software authentication requests, such as those from browsers or email clients. This may also be paired with user activity monitoring (i.e., Browser Information Discovery and/or Application Window Discovery) to spoof prompts when users are naturally accessing sensitive sites/data.

ID: T1056.002
Sub-technique of:  T1056
Platforms: Linux, Windows, macOS
Contributors: Matthew Molyett, @s1air, Cisco Talos
Version: 1.3
Created: 11 February 2020
Last Modified: 15 April 2024

Procedure Examples

ID Name Description
S0482 Bundlore

Bundlore prompts the user for their credentials.[6]

S0274 Calisto

Calisto presents an input prompt asking for the user's login and password.[7]

S1153 Cuckoo Stealer

Cuckoo Stealer has captured passwords by prompting victims with a "macOS needs to access System Settings" GUI window.[8]

S0281 Dok

Dok prompts the user for credentials.[9]

G0085 FIN4

FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.[10][11]

S0278 iKitten

iKitten prompts the user for their credentials.[9]

S0276 Keydnap

Keydnap prompts the users for credentials.[12]

S0455 Metamorfo

Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.[13]

S1122 Mispadu

Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.[14][15]

S0279 Proton

Proton prompts users for their credentials.[9]

G1039 RedCurl

RedCurl prompts the user for credentials through a Microsoft Outlook pop-up.[16][17]

S0692 SILENTTRINITY

SILENTTRINITY's credphisher.py module can prompt a current user for their credentials.[18]

S0658 XCSSET

XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process /Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment.[19]

Mitigations

ID Mitigation Description
M1017 User Training

Use user training as a way to bring awareness and raise suspicion for potentially malicious events and dialog boxes (ex: Office documents prompting for credentials).

Detection

ID Data Source Data Component Detects
DS0017 Command Command Execution

Monitor executed commands and arguments, such as requests for credentials and/or strings related to creating password prompts that may be malicious.[4]

DS0009 Process Process Creation

Monitor for newly executed processes

DS0012 Script Script Execution

Monitor for any attempts to enable scripts running on a system would be considered suspicious. If scripts are not commonly used on a system, but enabled, scripts running out of cycle from patching or other administrator functions are suspicious. Scripts should be captured from the file system when possible to determine their actions and intent.

References