NPPSPY is an implementation of a theoretical mechanism first presented in 2004 for capturing credentials submitted to a Windows system via a rogue Network Provider API item. NPPSPY captures credentials following submission and writes them to a file on the victim system for follow-on exfiltration.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1557 | 中间人攻击 |
NPPSPY opens a new network listener for the |
|
| Enterprise | T1005 | 从本地系统获取数据 |
NPPSPY records data entered from the local system logon at Winlogon to capture credentials in cleartext.[1] |
|
| Enterprise | T1656 | 伪装 |
NPPSPY creates a network listener using the misspelled label |
|
| Enterprise | T1112 | 修改注册表 |
NPPSPY modifies the Registry to record the malicious listener for output from the Winlogon process.[1] |
|
| Enterprise | T1552 | 未加密凭证 |
NPPSPY captures credentials by recording them through an alternative network listener registered to the |
|
| Enterprise | T1119 | 自动化收集 |
NPPSPY collection is automatically recorded to a specified file on the victim machine.[1] |
|
| Enterprise | T1056 | 输入捕获 |
NPPSPY captures user input into the Winlogon process by redirecting RPC traffic from legitimate listening DLLs within the operating system to a newly registered malicious item that allows for recording logon information in cleartext.[1] |
|