CAPEC-637: Collect Data from Clipboard
ID
CAPEC-637
Typical Severity
Low
Likelihood Of Attack
Low
Status
Stable
The adversary exploits an application that allows for the copying of sensitive data or information by collecting information copied to the clipboard. Data copied to the clipboard can be accessed by other applications, such as malware built to exfiltrate or log clipboard contents on a periodic basis. In this way, the adversary aims to garner information to which they are unauthorized.
Weaknesses
# ID | Name | Type |
---|---|---|
CWE-267 | Privilege Defined With Unsafe Actions | weakness |
Taxonomiy Mapping
Type | # ID | Name |
---|---|---|
ATTACK | 1115 | Clipboard Data |