Overlay Attack
ID: | TEQ-048 |
Phase(s): | Attack Execution |
Tactic(s): | Fake Interaction |
The adversary overlays a window over another application, to alter the information displayed to a user or allow them to steal user input.
ID: | TEQ-048 |
Phase(s): | Attack Execution |
Tactic(s): | Fake Interaction |
The adversary overlays a window over another application, to alter the information displayed to a user or allow them to steal user input.