Dark Mode

Settings

Capec-506 Detail

Tapjacking

Standard Software Likelihood: Low Typical Severity: Low

Parents: 173

Description

An adversary, through a previously installed malicious application, displays an interface that misleads the user and convinces them to tap on an attacker desired location on the screen. This is often accomplished by overlaying one screen on top of another while giving the appearance of a single interface. There are two main techniques used to accomplish this. The first is to leverage transparent properties that allow taps on the screen to pass through the visible application to an application running in the background. The second is to strategically place a small object (e.g., a button or text field) on top of the visible screen and make it appear to be a part of the underlying application. In both cases, the user is convinced to tap on the screen but does not realize the application that they are interacting with.

Not present

External ID Source Link Description
CAPEC-506 capec https://capec.mitre.org/data/definitions/506.html
CWE-1021 cwe http://cwe.mitre.org/data/definitions/1021.html
REF-436 reference_from_CAPEC https://media.blackhat.com/ad-12/Niemietz/bh-ad-12-androidmarcus_niemietz-WP.pdf Marcus Niemietz, Jorg Schwenk, UI Redressing Attacks on Android Devices, 2012, Horst Gortz Institute for IT-Security
REF-437 reference_from_CAPEC https://blog.lookout.com/look-10-007-tapjacking/ David Richardson, Look-10-007 - Tapjacking, 2010, Lookout Mobile Security

Not present

  1. This pattern of attack requires the ability to execute a malicious application on the user's device. This malicious application is used to present the interface to the user and make the attack possible.

Not present

Not present

Not present

Not present