Adversaries may use methods of capturing user input to obtain credentials.
The MITRE Corporation. (2024). MITRE ATT&CK Enterprise Matrix. https://attack.mitre.org/matrices/enterprise/