|
|
|
CAPEC-383: Harvesting Information via API Event Monitoring |
Description An adversary hosts an event within an application framework and then monitors the data exchanged during the course of the event for the purpose of harvesting any important data leaked during the transactions. One example could be harvesting lists of usernames or userIDs for the purpose of sending spam messages to those users. One example of this type of attack involves the adversary creating an event within the sub-application. Assume the adversary hosts a "virtual sale" of rare items. As other users enter the event, the attacker records via AiTM ( CAPEC-94) proxy the user_ids and usernames of everyone who attends. The adversary would then be able to spam those users within the application using an automated script. Typical Severity Prerequisites
The target software is utilizing application framework APIs |
Consequences This table specifies different individual consequences associated with the attack pattern. The Scope identifies the security property that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in their attack. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a pattern will be used to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.Scope | Impact | Likelihood |
---|
Confidentiality | Read Data | |
Mitigations
Leverage encryption techniques during information transactions so as to protect them from attack patterns of this kind. |
Taxonomy Mappings CAPEC mappings to ATT&CK techniques leverage an inheritance model to streamline and minimize direct CAPEC/ATT&CK mappings. Inheritance of a mapping is indicated by text stating that the parent CAPEC has relevant ATT&CK mappings. Note that the ATT&CK Enterprise Framework does not use an inheritance model as part of the mapping to CAPEC.Relevant to the ATT&CK taxonomy mapping (also see parent) Entry ID | Entry Name |
---|
1056.004 | Input Capture: Credential API Hooking |
References
[REF-327] Tom Stracener and
Sean Barnum. "So Many Ways [...]: Exploiting Facebook and YoVille". Defcon 18. 2010.
|
Content History Submissions |
---|
Submission Date | Submitter | Organization |
---|
2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | Modifications |
---|
Modification Date | Modifier | Organization |
---|
2018-07-31 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | Updated Attack_Motivation-Consequences, Attack_Prerequisites, Description Summary, Related_Attack_Patterns, Resources_Required, Solutions_and_Mitigations | 2019-04-04 (Version 3.1) | CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns | 2020-12-17 (Version 3.4) | CAPEC Content Team | The MITRE Corporation | Updated Resources_Required | 2021-06-24 (Version 3.5) | CAPEC Content Team | The MITRE Corporation | Updated Description | 2022-09-29 (Version 3.8) | CAPEC Content Team | The MITRE Corporation | Updated Related_Attack_Patterns, Taxonomy_Mappings | Previous Entry Names |
---|
Change Date | Previous Entry Name |
---|
2018-07-31 (Version 2.12) | Harvesting Usernames or UserIDs via Application API Event Monitoring | |
More information is available — Please select a different filter.
|