Overlay Attack
| ID: | TEQ-048 |
| Phase(s): | Attack Execution |
| Tactic(s): | Fake Interaction |
The adversary overlays a window over another application, to alter the information displayed to a user or allow them to steal user input.
| ID: | TEQ-048 |
| Phase(s): | Attack Execution |
| Tactic(s): | Fake Interaction |
The adversary overlays a window over another application, to alter the information displayed to a user or allow them to steal user input.