Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications. For example, on Windows adversaries can access clipboard data by using <code>clip.exe</code> or <code>Get-Clipboard</code>.(Citation: MSDN Clipboard)(Citation: clip_win_server)(Citation: CISA_AA21_200B) Additionally, adversaries may monitor then replace users’ clipboard with their data (e.g., [Transmitted Data Manipulation](https://attack.mitre.org/techniques/T1565/002)).(Citatio...
BY SOURCE
PROCEDURES (8)
Auto-extracted: 4 detections for process creation monitoring
Auto-extracted: 3 detections for exfiltrat
Auto-extracted: 3 detections for general monitoring
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for credential
Auto-extracted: 1 detections for script block
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for powershell