![]() ![]() KONNI had a feature to steal data from the clipboard. Koadic can retrieve the current content of the user clipboard. Ī JHUHUGIT variant accesses a screenshot saved in the clipboard and converts it to a JPG image. The executable version of Helminth has a module to log clipboard contents. Grandoreiro can capture clipboard data from a compromised host. Įxplosive has a function to use the OpenClipboard wrapper. Įmpire can harvest clipboard data on both Windows and macOS systems. ĭarkTortilla can download a clipboard information stealer module. ĭarkComet can steal data from the clipboard. ĬosmicDuke copies and exfiltrates the clipboard contents every 30 seconds. Ĭlambling has the ability to capture and store clipboard data. Ĭatchamas steals data stored in the clipboard. Ĭadelspy has the ability to steal data from the clipboard. ![]() Īttor has a plugin that collects data stored in the Windows clipboard by using the OpenClipboard and GetClipboardData APIs. Īstaroth collects information from the clipboard by using the OpenClipboard() and GetClipboardData() libraries. ĪPT39 has used tools capable of stealing contents of the clipboard. ĪPT38 used a Trojan called KEYLIME to collect data from the clipboard. Agent Tesla can steal data from the victim’s clipboard. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |