Common Information
Type Value
Value
Screen Capture
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
Details Published Attributes CTI Title
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog
Details Website 2024-11-13 55 HawkEye | PredatorPain
Details Website 2024-11-11 0 Game Over
Details Website 2024-11-08 0 Revolutionize Your Business With These Must-Have Computer Monitoring Tools! 🚀
Details Website 2024-11-06 0 Winos4.0 Malware Found in Game Apps, Targets Windows Users
Details Website 2024-11-04 35 G700 : The Next Generation of Craxs RAT - CYFIRMA
Details Website 2024-11-04 38 Monthly Threat Actor Group Intelligence Report, September 2024 (KOR)
Details Website 2024-11-04 14 Monthly Threat Actor Group Intelligence Report, August 2024 (JPN)
Details Website 2024-11-04 16 Monthly Threat Actor Group Intelligence Report, August 2024 (JPN) – Red Alert
Details Website 2024-11-04 38 Monthly Threat Actor Group Intelligence Report, September 2024 (KOR) – Red Alert
Details Website 2024-11-01 7 New LightSpy spyware version targets iPhones
Details Website 2024-10-31 0 Streamline IT Support with Image Analysis - SysAid
Details Website 2024-10-30 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware
Details Website 2024-10-30 154 Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T.
Details Website 2024-10-29 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware - Zimperium
Details Website 2024-10-29 22 Notorious WrnRAT Delivered Mimic As Gambling Games
Details Website 2024-10-29 2 Notorious WrnRAT Delivered Mimic As Gambling Games
Details Website 2024-10-29 207 WarmCookie Malware Threat Intel
Details Website 2024-10-29 14 Monthly Threat Actor Group Intelligence Report, July 2024 (JPN)
Details Website 2024-10-29 16 Monthly Threat Actor Group Intelligence Report, July 2024 (JPN) – Red Alert
Details Website 2024-10-29 28 Monthly Threat Actor Group Intelligence Report, August 2024 (ENG) – Red Alert
Details Website 2024-10-28 67 Apple Updates Everything - SANS Internet Storm Center
Details Website 2024-10-23 44 Highlighting TA866/Asylum Ambuscade Activity Since 2021
Details Website 2024-10-21 4 WrnRAT Distributed Under the Guise of Gambling Games - ASEC