T1056.001 - Keylogging
Sub-technique
Tattiche:
Credential Access Collection
Credential Access Collection
Piattaforme:
Linux macOS Network Devices Windows
Linux macOS Network Devices Windows
Rilevamento:
Not specified
Not specified
Description:
Adversaries may log user keystrokes to intercept credentials as the user types them. Keylogging is likely to be used to acquire credentials for new access opportunities when [OS Credential Dumping](https://attack.mitre.org/techniques/T1003) efforts are not effective, and may require an adversary to intercept keystrokes on a system for a substantial period of time before credentials can be successfully captured. In order to increase the likelihood of capturing credentials quickly, an adversary may also perform actions such as clearing browser cookies to force users to reauthenticate to systems.(Citation: Talos Kimsuky Nov 2021)
Keylogging is the most prevalent type of input capture, with many different ways of intercepting keystrokes.(Citation: Adventures of a Keystroke) Some methods include:
* Hooking API callbacks used for processing keystrokes. Unlike [Credential API Hooking](https://attack.mitre.org/techniques/T1056/004), this focuses solely on API functions intended for processing keystroke data.
* Reading raw keystroke data from the hardware buffer.
* Windows Registry modifications.
* Custom drivers.
* [Modify System Image](https://attack.mitre.org/techniques/T1601) may provide adversaries with hooks into the operating system of network devices to read raw keystrokes for login sessions.(Citation: Cisco Blog Legacy Device Attacks)
Keylogging is the most prevalent type of input capture, with many different ways of intercepting keystrokes.(Citation: Adventures of a Keystroke) Some methods include:
* Hooking API callbacks used for processing keystrokes. Unlike [Credential API Hooking](https://attack.mitre.org/techniques/T1056/004), this focuses solely on API functions intended for processing keystroke data.
* Reading raw keystroke data from the hardware buffer.
* Windows Registry modifications.
* Custom drivers.
* [Modify System Image](https://attack.mitre.org/techniques/T1601) may provide adversaries with hooks into the operating system of network devices to read raw keystrokes for login sessions.(Citation: Cisco Blog Legacy Device Attacks)
Usato da Attori (20)
APT3
Nation-state
Nation-state
DarkHotel
Nation-state
Nation-state
APT28
Nation-state
Nation-state
Lazarus Group
Nation-state
Nation-state
OilRig
Nation-state
Nation-state
APT32
Nation-state
Nation-state
PLATINUM
Unknown
Unknown
Tonto Team
Nation-state
Nation-state
APT5
Unknown
Unknown
Kimsuky
Nation-state
Nation-state
Sowbug
Nation-state
Nation-state
APT39
Unknown
Unknown
Group5
Unknown
Unknown
APT41
Nation-state
Nation-state
FIN13
Unknown
Unknown
APT42
Nation-state
Nation-state
Volt Typhoon
Unknown
Unknown
Sandworm Team
Unknown
Unknown
HEXANE
Unknown
Unknown
Ke3chang
Unknown
Unknown
Malware (20)
RCSession other
yty other
DOGCALL other
PAKLOG other
Zeus Panda other
Matryoshka other
InvisibleFerret other
TONESHELL other
Kasidet other
AppleSeed other
NETWIRE other
BOOKWORM other
CosmicDuke other
EvilGrab other
SslMM other
GreyEnergy other
Crimson other
DUSTTRAP other
Machete other
PowerLess other
Metadata
| MITRE ID: | T1056.001 |
| STIX ID: | attack-pattern--09a60ea3-a8d1-... |
| Piattaforme: | Linux, macOS, Network Devices, Windows |
| Created: | 13/01/2026 17:48 |
| Updated: | 06/03/2026 16:00 |