An adversary, through a previously installed malicious application, impersonates a credential prompt in an attempt to steal a user's credentials.
Description
Attack Execution Flow
2
Mitigations
1
Consequences
Indicators
1
Relationships
Related ATT&CK Techniques
2
Resources Required
2