Adversaries may collect data stored in the clipboard from users copying information within or between applications.
For example, on Windows adversaries can access clipboard data by using clip.exe
or Get-Clipboard
.[1][2][3] Additionally, adversaries may monitor then replace users’ clipboard with their data (e.g., Transmitted Data Manipulation).[4]
macOS and Linux also have commands, such as pbpaste
, to grab clipboard contents.[5]
ID | Name | Description |
---|---|---|
S0331 | Agent Tesla |
Agent Tesla can steal data from the victim’s clipboard.[6][7][8][9] |
G0082 | APT38 |
APT38 used a Trojan called KEYLIME to collect data from the clipboard.[10] |
G0087 | APT39 |
APT39 has used tools capable of stealing contents of the clipboard.[11] |
S0373 | Astaroth |
Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries. [12] |
S0438 | Attor |
Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs.[13] |
S0454 | Cadelspy |
Cadelspy has the ability to steal data from the clipboard.[14] |
S0261 | Catchamas | |
S1149 | CHIMNEYSWEEP |
CHIMNEYSWEEP can capture content from the clipboard.[16] |
S0660 | Clambling |
Clambling has the ability to capture and store clipboard data.[17][18] |
S0050 | CosmicDuke |
CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.[19] |
S0334 | DarkComet | |
S1111 | DarkGate |
DarkGate starts a thread on execution that captures clipboard data and logs it to a predefined log file.[21] |
S1066 | DarkTortilla |
DarkTortilla can download a clipboard information stealer module.[22] |
S0363 | Empire |
Empire can harvest clipboard data on both Windows and macOS systems.[23] |
S0569 | Explosive |
Explosive has a function to use the OpenClipboard wrapper.[24] |
S0381 | FlawedAmmyy |
FlawedAmmyy can collect clipboard data.[25] |
S0531 | Grandoreiro |
Grandoreiro can capture clipboard data from a compromised host.[26] |
S0170 | Helminth |
The executable version of Helminth has a module to log clipboard contents.[27] |
S0044 | JHUHUGIT |
A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image.[28] |
S0283 | jRAT | |
S0250 | Koadic |
Koadic can retrieve the current content of the user clipboard.[30] |
S0356 | KONNI | |
S0409 | Machete |
Machete hijacks the clipboard data by creating an overlapped window that listens to keyboard events.[32][33] |
S0282 | MacSpy | |
S0652 | MarkiRAT | |
S0530 | Melcoz | |
S0455 | Metamorfo |
Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.[37][38] |
S1146 | MgBot | |
S1122 | Mispadu |
Mispadu has the ability to capture and replace Bitcoin wallet data in the clipboard on a compromised host.[41] |
C0014 | Operation Wocao |
During Operation Wocao, threat actors collected clipboard data in plaintext.[42] |
S0332 | Remcos | |
S0375 | Remexi | |
S0240 | ROKRAT |
ROKRAT can extract clipboard data from a compromised host.[45] |
S0148 | RTM | |
S0253 | RunningRAT |
RunningRAT contains code to open and copy data from the clipboard.[48] |
S0692 | SILENTTRINITY |
SILENTTRINITY can monitor Clipboard text and can use |
S0467 | TajMahal |
TajMahal has the ability to steal data from the clipboard of an infected host.[50] |
S0004 | TinyZBot |
TinyZBot contains functionality to collect information from the clipboard.[51] |
S0257 | VERMIN | |
S0330 | Zeus Panda |
Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.[53] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments to collect data stored in the clipboard from users copying information within or between applications. |
DS0009 | Process | OS API Execution |
Monitor API calls that could collect data stored in the clipboard from users copying information within or between applications. |