Adversaries may enumerate information about browsers to learn more about compromised environments. Data saved by browsers (such as bookmarks, accounts, and browsing history) may reveal a variety of personal information about users (e.g., banking sites, relationships/interests, social media, etc.) as well as details about internal network resources such as servers, tools/dashboards, or other related infrastructure.[1]
Browser information may also highlight additional targets after an adversary has access to valid credentials, especially Credentials In Files associated with logins cached by a browser.
Specific storage locations vary based on platform and/or application, but browser information is typically stored in local files and databases (e.g., %APPDATA%/Google/Chrome).[2]
| ID | Name | Description |
|---|---|---|
| C0057 | 3CX Supply Chain Attack |
During the 3CX Supply Chain Attack, AppleJeus leveraged ICONICSTEALER to steal browser information to include browser history located on the infected host.[3][4][5] |
| G0082 | APT38 |
APT38 has collected browser bookmark information to learn more about compromised hosts, obtain personal information about users, and acquire details about internal network resources.[6] |
| S1246 | BeaverTail |
BeaverTail has searched the victim device for browser extensions including those commonly associated with cryptocurrency wallets.[7][8][9][10][11][12][13] |
| S0274 | Calisto |
Calisto collects information on bookmarks from Google Chrome.[14] |
| G0114 | Chimera |
Chimera has used |
| S1153 | Cuckoo Stealer |
Cuckoo Stealer can collect bookmarks, cookies, and history from Safari.[16] |
| S0673 | DarkWatchman |
DarkWatchman can retrieve browser history.[17] |
| S0567 | Dtrack | |
| S0363 | Empire |
Empire has the ability to gather browser data such as bookmarks and visited sites.[20] |
| G0117 | Fox Kitten |
Fox Kitten has used Google Chrome bookmarks to identify internal resources and assets.[21] |
| C0044 | Juicy Mix |
During Juicy Mix, OilRig used the CDumper (Chrome browser) and EDumper (Edge browser) data stealers to collect cookies, browsing history, and credentials.[22] |
| S1185 | LightSpy |
To collect data on the host's Wi-Fi connection history, LightSpy reads the |
| S0681 | Lizar |
Lizar can retrieve browser history and database files.[24][25] |
| S1213 | Lumma Stealer |
Lumma Stealer has identified and gathered information from two-factor authentication extensions for multiple browsers.[26] |
| S0409 | Machete |
Machete retrieves the user profile data (e.g., browsers) from Chrome and Firefox browsers.[27] |
| S1060 | Mafalda |
Mafalda can collect the contents of the |
| S1122 | Mispadu |
Mispadu can monitor browser activity for online banking actions and display full-screen overlay images to block user access to the intended site or present additional data fields.[29][30] |
| S0079 | MobileOrder |
MobileOrder has a command to upload to its C2 server victim browser bookmarks.[31] |
| G1036 | Moonstone Sleet |
Moonstone Sleet deployed malware such as YouieLoader capable of capturing victim system browser information.[32] |
| C0042 | Outer Space |
During Outer Space, OilRig used a Chrome data dumper named MKG.[22] |
| S1012 | PowerLess |
PowerLess has a browser info stealer module that can read Chrome and Edge browser database files.[33] |
| S1240 | RedLine Stealer |
RedLine Stealer can collect information from browsers and browser extensions.[34] |
| G1015 | Scattered Spider |
Scattered Spider retrieves browser histories via infostealer malware such as Raccoon Stealer.[35] |
| S1042 | SUGARDUMP |
SUGARDUMP has collected browser bookmark and history information.[36] |
| S1196 | Troll Stealer |
Troll Stealer collects information from Chromium-based browsers and Firefox such as cookies, history, downloads, and extensions.[37][38] |
| G1017 | Volt Typhoon |
Volt Typhoon has targeted the browsing history of network administrators.[39] |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0013 | Detection of Local Browser Artifact Access for Reconnaissance | AN0037 |
Access to browser artifact locations (e.g., Chrome, Edge, Firefox) by processes like PowerShell, cmd.exe, or unknown tools, followed by file reads, decoding, or export operations indicating enumeration of bookmarks, autofill, or history databases. |
| AN0038 |
Unauthorized shell or script-based access to browser config or SQLite history files, typically in ~/.config/google-chrome/, ~/.mozilla/, or ~/.var/app folders, indicating enumeration of bookmarks or saved credentials. |
||
| AN0039 |
Scripting or CLI tool access to ~/Library/Application Support/Google/Chrome or ~/Library/Safari bookmarks, cookies, or history databases. Detection relies on unexpected processes accessing or reading from these locations. |