Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt.
Sub-technique of
T1056
See: MITRE ATT&CK
Adversaries may mimic common operating system GUI components to prompt users for credentials with a seemingly legitimate prompt.
Sub-technique of
T1056
See: MITRE ATT&CK