Skip to content

T1056.002 GUI Input Capture

Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt. When programs are executed that need additional privileges than are present in the current user context, it is common for the operating system to prompt the user for proper credentials to authorize the elevated privileges for the task (ex: Bypass User Account Control).

Adversaries may mimic this functionality to prompt users for credentials with a seemingly legitimate prompt for a number of reasons that mimic normal usage, such as a fake installer requiring additional access or a fake malware removal suite.1 This type of prompt can be used to collect credentials via various languages such as AppleScript234 and PowerShell.254 On Linux systems adversaries may launch dialog boxes prompting users for credentials from malicious shell scripts or the command line (i.e. Unix Shell).4

Item Value
ID T1056.002
Sub-techniques T1056.001, T1056.002, T1056.003, T1056.004
Tactics TA0009, TA0006
CAPEC ID CAPEC-659
Platforms Linux, Windows, macOS
Permissions required User
Version 1.2
Created 11 February 2020
Last Modified 08 March 2022

Procedure Examples

ID Name Description
S0482 Bundlore Bundlore prompts the user for their credentials.12
S0274 Calisto Calisto presents an input prompt asking for the user’s login and password.7
S0281 Dok Dok prompts the user for credentials.9
G0085 FIN4 FIN4 has presented victims with spoofed Windows Authentication prompts to collect their credentials.1314
S0278 iKitten iKitten prompts the user for their credentials.9
S0276 Keydnap Keydnap prompts the users for credentials.8
S0455 Metamorfo Metamorfo has displayed fake forms on top of banking sites to intercept credentials from victims.10
S0279 Proton Proton prompts users for their credentials.9
S0692 SILENTTRINITY SILENTTRINITY‘s credphisher.py module can prompt a current user for their credentials.6
S0658 XCSSET XCSSET prompts the user to input credentials using a native macOS dialog box leveraging the system process /Applications/Safari.app/Contents/MacOS/SafariForWebKitDevelopment.11

Mitigations

ID Mitigation Description
M1017 User Training Use user training as a way to bring awareness and raise suspicion for potentially malicious events and dialog boxes (ex: Office documents prompting for credentials).

Detection

ID Data Source Data Component
DS0017 Command Command Execution
DS0009 Process Process Creation
DS0012 Script Script Execution

References


  1. Sergei Shevchenko. (2015, June 4). New Mac OS Malware Exploits Mackeeper. Retrieved July 3, 2017. 

  2. Foss, G. (2014, October 3). Do You Trust Your Computer?. Retrieved December 17, 2018. 

  3. Marc-Etienne M.Leveille. (2016, July 6). New OSX/Keydnap malware is hungry for credentials. Retrieved July 3, 2017. 

  4. Johann Rehberger. (2021, April 18). Spoofing credential dialogs on macOS Linux and Windows. Retrieved August 19, 2021. 

  5. Nelson, M. (2015, January 21). Phishing for Credentials: If you want it, just ask!. Retrieved December 17, 2018. 

  6. Salvati, M. (2019, August 6). SILENTTRINITY Modules. Retrieved March 24, 2022. 

  7. Pantig, J. (2018, July 30). OSX.Calisto. Retrieved September 7, 2018. 

  8. Patrick Wardle. (2017, January 1). Mac Malware of 2016. Retrieved September 21, 2018. 

  9. Patrick Wardle. (n.d.). Mac Malware of 2017. Retrieved September 21, 2018. 

  10. Sierra, E., Iglesias, G.. (2018, April 24). Metamorfo Campaigns Targeting Brazilian Users. Retrieved July 30, 2020. 

  11. Mac Threat Response, Mobile Research Team. (2020, August 13). The XCSSET Malware: Inserts Malicious Code Into Xcode Projects, Performs UXSS Backdoor Planting in Safari, and Leverages Two Zero-day Exploits. Retrieved October 5, 2021. 

  12. Sushko, O. (2019, April 17). macOS Bundlore: Mac Virus Bypassing macOS Security Features. Retrieved June 30, 2020. 

  13. Vengerik, B. et al.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved December 17, 2018. 

  14. Vengerik, B. & Dennesen, K.. (2014, December 5). Hacking the Street? FIN4 Likely Playing the Market. Retrieved January 15, 2019. 

Back to top