CIC-ATT&CK

Critical Infrastructure Cybersecurity

Secure Environment
Critical Infrastructure Cybersecurity Framework

Clipboard Data

Adversaries may collect data stored in the clipboard from users copying information within or between applications.

Description

Adversaries may collect data stored in the clipboard from users copying information within or between applications.

Quick Info

Technique ID
T1115
Mitigations
0

By using this website, you agree to our legal documents. Please review our Privacy Policy, Terms of Use, and Accessibility Statement in the footer.