CAPEC-654 Credential Prompt Impersonation

CAPEC ID: 654

CAPEC-654 Metadata

Likelihood of Attack

Medium

Typical Severity

High

Overview

Summary

An adversary, through a previously installed malicious application, impersonates a credential prompt in an attempt to steal a user's credentials.

Prerequisites

The adversary must already have access to the target system via some means. A legitimate task must exist that an adversary can impersonate to glean credentials.

Execution Flow

Step Phase Description Techniques
1 Explore [Determine suitable tasks to exploit] Determine what tasks exist on the target system that may result in a user providing their credentials.
  • Determine what tasks prompt a user for their credentials.
2 Exploit [Impersonate Task] Impersonate a legitimate task, either expected or unexpected, in an attempt to gain user credentials.
  • Prompt a user for their credentials, while making the user believe the credential request is legitimate.

Potential Solutions / Mitigations

The only known mitigation to this attack is to avoid installing the malicious application on the device. However, to impersonate a running task the malicious application does need the GET_TASKS permission to be able to query the task list, and being suspicious of applications with that permission can help.

Related Weaknesses (CWE)

CWE ID Description
CWE-1021 Improper Restriction of Rendered UI Layers or Frames

Related CAPECs

CAPEC ID Description
CAPEC-504 An adversary, through a previously installed malicious application, impersonates an expected or routine task in an attempt to steal sensitive information or leverage a user's privileges.

Taxonomy Mappings

Taxonomy: ATTACK

Entry ID Entry Name
1056 Input Capture
1548.004 Abuse Elevation Control Mechanism: Elevated Execution with Prompt

Stay Ahead of Attack Patterns

Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.