CAPEC 637 Collect Data from Clipboard

Stable Detailed Low Risk
Severity Low

Description

The adversary exploits an application that allows for the copying of sensitive data or information by collecting information copied to the clipboard. Data copied to the clipboard can be accessed by other applications, such as malware built to exfiltrate or log clipboard contents on a periodic basis. In this way, the adversary aims to garner information to which they are unauthorized.

Attack Execution Flow

3

Mitigations

2

Consequences

Relationships

Related ATT&CK Techniques

1