Esc
Keylogging - T1056.001
(ATT&CK® Technique)
Definition
Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when OS Credential Dumping efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.