T1056 Input Capture Mappings

Adversaries may use methods of capturing user input to obtain credentials or collect information. During normal system usage, users often provide credentials to various different locations, such as login pages/portals or system dialog boxes. Input capture mechanisms may be transparent to the user (e.g. Credential API Hooking) or rely on deceiving the user into providing input into what they believe to be a genuine service (e.g. Web Portal Capture).

View in MITRE ATT&CK®

Mappings

Capability ID Capability Description Mapping Type ATT&CK ID ATT&CK Name Notes
intel-tdt Intel Threat Detection Technology CrowdStrike AMS T1056 Input Capture
Comments
Intel Threat Detection Technology (TDT), combined with CrowdStrike Falcon Accelerated Memory Scanning (CAMS), enhances cybersecurity defenses by enabling faster, real-time detection of Input Capture exploits. This integrated solution strengthens CrowdStrike Falcon, improving its ability to detect and mitigate cyber threats earlier in the kill chain, all while minimizing system performance impact. Input Capture attacks involve adversaries using malicious software to intercept or record user inputs, such as keystrokes, mouse clicks, or other device interactions. These attacks are often used to steal sensitive data, such as login credentials, personal information, or other private data. The captured input can then be exfiltrated or used for further exploitation. Intel TDT plays a crucial role in identifying these threats by providing real-time telemetry on program execution, memory access, and control flow, enabling rapid detection of abnormal behaviors that may indicate the interception of user input or manipulation of input devices. Additionally, CAMS offloads the memory scanning workload from the CPU to the Intel Integrated GPU, allowing for faster, more efficient detection of malicious activity without degrading system performance. CAMS helps identify suspicious behaviors, such as unauthorized monitoring or logging of user inputs, providing proactive defense against evasive input capture techniques.
References

ATT&CK Subtechniques

Technique ID Technique Name Number of Mappings
T1056.001 Keylogging 1
T1056.003 Web Portal Capture 1
T1056.004 Credential API Hooking 1