Description An adversary, through a previously installed malicious application, displays an interface that misleads the user and convinces them to tap on an attacker desired location on the screen. This is often accomplished by overlaying one screen on top of another while giving the appearance of a single interface. There are two main techniques used to accomplish this. The first is to leverage transparent properties that allow taps on the screen to pass through the visible application to an application running in the background. The second is to strategically place a small object (e.g., a button or text field) on top of the visible screen and make it appear to be a part of the underlying application. In both cases, the user is convinced to tap on the screen but does not realize the application that they are interacting with. Likelihood Of Attack Typical Severity Prerequisites
| This pattern of attack requires the ability to execute a malicious application on the user's device. This malicious application is used to present the interface to the user and make the attack possible. |
References Content History | Submissions |
|---|
| Submission Date | Submitter | Organization |
|---|
| 2014-06-23 (Version 2.6) | CAPEC Content Team | The MITRE Corporation | | | Modifications |
|---|
| Modification Date | Modifier | Organization |
|---|
| 2017-05-01 (Version 2.10) | CAPEC Content Team | The MITRE Corporation | | Updated Description Summary | | 2017-08-04 (Version 2.11) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Weaknesses | | 2018-07-31 (Version 2.12) | CAPEC Content Team | The MITRE Corporation | | Updated Description Summary | | 2019-09-30 (Version 3.2) | CAPEC Content Team | The MITRE Corporation | | Updated Related_Attack_Patterns | | 2020-07-30 (Version 3.3) | CAPEC Content Team | The MITRE Corporation | | Updated Description |
More information is available — Please select a different filter.
|