Adversaries may collect data stored in the clipboard from users copying information within or between applications.
For example, on Windows adversaries can access clipboard data by using clip.exe or Get-Clipboard.[1][2][3] Additionally, adversaries may monitor then replace users’ clipboard with their data (e.g., Transmitted Data Manipulation).[4]
macOS and Linux also have commands, such as pbpaste, to grab clipboard contents.[5]
| ID | Name | Description |
|---|---|---|
| S0331 | Agent Tesla |
Agent Tesla can steal data from the victim’s clipboard.[6][7][8][9] |
| G0082 | APT38 |
APT38 used a Trojan called KEYLIME to collect data from the clipboard.[10] |
| G0087 | APT39 |
APT39 has used tools capable of stealing contents of the clipboard.[11] |
| S0373 | Astaroth |
Astaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries. [12] |
| S0438 | Attor |
Attor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs.[13] |
| S1226 | BOOKWORM |
BOOKWORM has used its KBLogger.dll module to steal data saved to the clipboard. [14] |
| S0454 | Cadelspy |
Cadelspy has the ability to steal data from the clipboard.[15] |
| S0261 | Catchamas | |
| S1149 | CHIMNEYSWEEP |
CHIMNEYSWEEP can capture content from the clipboard.[17] |
| S0660 | Clambling |
Clambling has the ability to capture and store clipboard data.[18][19] |
| S0050 | CosmicDuke |
CosmicDuke copies and exfiltrates the clipboard contents every 30 seconds.[20] |
| S0334 | DarkComet | |
| S1111 | DarkGate |
DarkGate starts a thread on execution that captures clipboard data and logs it to a predefined log file.[22][23] |
| S1066 | DarkTortilla |
DarkTortilla can download a clipboard information stealer module.[24] |
| S0363 | Empire |
Empire can harvest clipboard data on both Windows and macOS systems.[25] |
| S0569 | Explosive |
Explosive has a function to use the OpenClipboard wrapper.[26] |
| S0381 | FlawedAmmyy |
FlawedAmmyy can collect clipboard data.[27] |
| S0531 | Grandoreiro |
Grandoreiro can capture clipboard data from a compromised host.[28] |
| S0170 | Helminth |
The executable version of Helminth has a module to log clipboard contents.[29] |
| S1245 | InvisibleFerret |
InvisibleFerret has stolen data from the clipboard using the Python project "pyperclip".[30][31][32] InvisibleFerret has also captured clipboard contents during copy and paste operations.[33] |
| S0044 | JHUHUGIT |
A JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image.[34] |
| S0283 | jRAT | |
| S0250 | Koadic |
Koadic can retrieve the current content of the user clipboard.[36] |
| S0356 | KONNI | |
| S0409 | Machete |
Machete hijacks the clipboard data by creating an overlapped window that listens to keyboard events.[38][39] |
| S0282 | MacSpy | |
| S0652 | MarkiRAT | |
| S0530 | Melcoz | |
| S0455 | Metamorfo |
Metamorfo has a function to hijack data from the clipboard by monitoring the contents of the clipboard and replacing the cryptocurrency wallet with the attacker's.[43][44] |
| S1146 | MgBot | |
| S1122 | Mispadu |
Mispadu has the ability to capture and replace Bitcoin wallet data in the clipboard on a compromised host.[47] |
| G0049 | OilRig |
OilRig has used infostealer tools to copy clipboard data.[48] |
| C0014 | Operation Wocao |
During Operation Wocao, threat actors collected clipboard data in plaintext.[49] |
| S1233 | PAKLOG | |
| S0332 | Remcos | |
| S0375 | Remexi | |
| S0240 | ROKRAT |
ROKRAT can extract clipboard data from a compromised host.[53] |
| S0148 | RTM | |
| S0253 | RunningRAT |
RunningRAT contains code to open and copy data from the clipboard.[56] |
| S0692 | SILENTTRINITY |
SILENTTRINITY can monitor Clipboard text and can use |
| S0467 | TajMahal |
TajMahal has the ability to steal data from the clipboard of an infected host.[58] |
| S0004 | TinyZBot |
TinyZBot contains functionality to collect information from the clipboard.[59] |
| S0257 | VERMIN | |
| S1207 | XLoader |
XLoader can collect data stored in the victim's clipboard.[61][62] |
| S0330 | Zeus Panda |
Zeus Panda can hook GetClipboardData function to watch for clipboard pastes to collect.[63] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0341 | Clipboard Data Access with Anomalous Context | AN0965 |
Detection of clipboard access via OS utilities (e.g., clip.exe, Get-Clipboard) by non-interactive or abnormal parent processes, potentially chained with staging or exfiltration commands. |
| AN0966 |
Detection of pbpaste/pbcopy clipboard access by processes without terminal sessions or linked to launch agents, potentially staged for collection. |
||
| AN0967 |
Detection of xclip or xsel access to clipboard buffers outside of user terminal context, especially when chained to staging (gzip, base64) or network exfiltration (curl, scp). |