Adversaries may install code on externally facing portals, such as a VPN login page, to capture and transmit credentials of users who attempt to log into the service. For example, a compromised login page may log provided user credentials before logging the user in to the service.
This variation on input capture may be conducted post-compromise using legitimate administrative access as a backup measure to maintain network access through External Remote Services and Valid Accounts or as part of the initial compromise by exploitation of the externally facing web service.(Citation: Volexity Virtual Private Keylogging)
View in MITRE ATT&CK®| Capability ID | Capability Description | Mapping Type | ATT&CK ID | ATT&CK Name | Notes |
|---|---|---|---|---|---|
| AC-02 | Account Management | Protects | T1056.003 | Web Portal Capture | |
| AC-03 | Access Enforcement | Protects | T1056.003 | Web Portal Capture | |
| AC-05 | Separation of Duties | Protects | T1056.003 | Web Portal Capture | |
| AC-06 | Least Privilege | Protects | T1056.003 | Web Portal Capture | |
| CM-05 | Access Restrictions for Change | Protects | T1056.003 | Web Portal Capture | |
| CM-06 | Configuration Settings | Protects | T1056.003 | Web Portal Capture | |
| IA-02 | Identification and Authentication (organizational Users) | Protects | T1056.003 | Web Portal Capture |