Input Prompt

When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: Bypass User Account Control).

Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.[1] This type of prompt can be used to collect credentials via various languages such as AppleScript[2][3] and PowerShell[2][4].

ID: T1141

Tactic: Credential Access

Platform:  macOS, Windows

Permissions Required:  User

Data Sources:  Process monitoring, Process command-line parameters, User interface, PowerShell logs

Contributors:  Matthew Molyett, @s1air

Version: 2.0

Examples

NameDescription
Calisto

Calisto presents an input prompt asking for the user's login and password.[5]

Dok

Dok prompts the user for credentials.[6]

FIN4

FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.[7][8]

iKitten

iKitten prompts the user for their credentials.[6]

Keydnap

Keydnap prompts the users for credentials.[9]

Proton

Proton prompts users for their credentials.[6]

Mitigation

This technique exploits users' tendencies to always supply credentials when prompted, which makes it very difficult to mitigate. Use user training as a way to bring awareness and raise suspicion for potentially malicious events (ex: Office documents prompting for credentials).

Detection

Monitor process execution for unusual programs as well as malicious instances of Scripting that could be used to prompt users for credentials.

Inspect and scrutinize input prompts for indicators of illegitimacy, such as non-traditional banners, text, timing, and/or sources.

References