Description
Adversaries may collect data stored in the clipboard from users copying information within or between applications. For example, on Windows adversaries can access clipboard data by using <code>clip.exe</code> or <code>Get-Clipboard</code>.(Citation: MSDN Clipboard)(Citation: clip_win_server)(Citation: CISA_AA21_200B) Additionally, adversaries may monitor then replace users’ clipboard with their data (e.g., [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002)).(Citation: mining_ruby_reversinglabs) macOS and Linux also have commands, such as <code>pbpaste</code>, to grab clipboard contents.(Citation: Operating with EmPyre)
Threat-Mapped Scoring
Threat Score:
2.8
Industry:
Threat Priority:
P2 - Serious (High)
ATT&CK Kill Chain Metadata
- Tactics: collection
- Platforms: Linux, Windows, macOS
-
Detection Guidance:
Access to the clipboard is a legitimate function of many applications on an operating system. If an organization chooses to monitor for this behavior, then the data will likely need to be correlated against other suspicious or non-user-driven activity.
Malware
- Agent Tesla
- Astaroth
- Attor
- CHIMNEYSWEEP
- Cadelspy
- Catchamas
- Clambling
- CosmicDuke
- DarkComet
- DarkGate
- DarkTortilla
- Explosive
- FlawedAmmyy
- Grandoreiro
- Helminth
- JHUHUGIT
- KONNI
- MacSpy
- Machete
- MarkiRAT
- Melcoz
- Metamorfo
- MgBot
- Mispadu
- ROKRAT
- RTM
- Remexi
- RunningRAT
- TajMahal
- TinyZBot
- VERMIN
- XLoader
- Zeus Panda
- jRAT