| ID | Name |
|---|---|
| T1056.001 | Keylogging |
| T1056.002 | GUI Input Capture |
| T1056.003 | Web Portal Capture |
| T1056.004 | Credential API Hooking |
Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: Bypass User Account Control).
Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.[1] This type of prompt can be used to collect credentials via various languages such as AppleScript[2][3][4] and PowerShell.[2][5][4] On Linux systems adversaries may launch dialog boxes prompting users for credentials from malicious shell scripts or the command line (i.e. Unix Shell).[4]
Adversaries may also mimic common software authentication requests, such as those from browsers or email clients. This may also be paired with user activity monitoring (i.e., Browser Information Discovery and/or Application Window Discovery) to spoof prompts when users are naturally accessing sensitive sites/data.
| ID | Name | Description |
|---|---|---|
| S0482 | Bundlore | |
| S0274 | Calisto |
Calisto presents an input prompt asking for the user's login and password.[7] |
| S1153 | Cuckoo Stealer |
Cuckoo Stealer has captured passwords by prompting victims with a "macOS needs to access System Settings" GUI window.[8] |
| S0281 | Dok | |
| G0085 | FIN4 |
FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.[10][11] |
| S0278 | iKitten | |
| S0276 | Keydnap | |
| S0455 | Metamorfo |
Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.[13] |
| S1122 | Mispadu |
Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.[14][15] |
| S0279 | Proton | |
| G1039 | RedCurl |
RedCurl prompts the user for credentials through a Microsoft Outlook pop-up.[16][17] |
| S0692 | SILENTTRINITY |
SILENTTRINITY's |
| S0658 | XCSSET |
XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process |
| ID | Mitigation | Description |
|---|---|---|
| M1017 | User Training |
Use user training as a way to bring awareness and raise suspicion for potentially malicious events and dialog boxes (ex: Office documents prompting for credentials). |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0521 | Behavioral Detection of Spoofed GUI Credential Prompts | AN1440 |
Detects suspicious use of PowerShell, .NET, or script interpreters to spawn processes that mimic UAC prompts, often with credential capture dialogue boxes invoked from non-standard parent processes. |
| AN1441 |
Detects GUI-based credential prompts invoked via zenity/kdialog/dialog or X11 APIs from non-user-facing scripts or background shell sessions, often with authentication-related text. |
||
| AN1442 |
Detects AppleScript or Objective-C usage to generate fake authentication windows (e.g., using display dialog or NSAlert) from user-launched or persistence-related processes. |