Common Information
Type | Value |
---|---|
Value |
Screen Capture |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-10-19 | 1 | Firejail: Your First Line of Defense for Linux Application Security | ||
Details | Website | 2024-10-15 | 0 | New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT | ||
Details | Website | 2024-10-15 | 0 | New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT - RedPacket Security | ||
Details | Website | 2024-10-14 | 1 | TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs | ||
Details | Website | 2024-10-14 | 55 | Hidden In Plain Sight: How ErrorFather Deploys Cerberus To Amplify Cyber Threats | ||
Details | Website | 2024-10-14 | 1 | Lab 3: The Hunt for Lost Files — Adventures in File Recovery | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples | ||
Details | Website | 2024-10-11 | 30 | Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium | ||
Details | Website | 2024-10-10 | 29 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 36 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 33 | Malware by the (Bit)Bucket: Uncovering AsyncRAT | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, August 2024 (KOR) | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, July 2024 (ENG) – Red Alert | ||
Details | Website | 2024-10-10 | 26 | Monthly Threat Actor Group Intelligence Report, August 2024 (KOR) – Red Alert | ||
Details | Website | 2024-10-10 | 18 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-09 | 0 | ISM’s Guidelines for Enterprise Mobility - Zimperium | ||
Details | Website | 2024-10-04 | 100 | Агент SIEM используется в атаках SilentCryptoMiner | ||
Details | Website | 2024-10-04 | 100 | SIEM agent being used in SilentCryptoMiner attacks | ||
Details | Website | 2024-10-01 | 9 | Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning | ||
Details | Website | 2024-10-01 | 153 | LightSpy: Implant for iOS | ||
Details | Website | 2024-09-27 | 58 | OSINT Investigation: Hunting Malicious Infrastructure Linked to Transparent Tribe - CYFIRMA | ||
Details | Website | 2024-09-26 | 5 | China-linked APT group Salt Typhoon compromised some US ISPs | ||
Details | Website | 2024-09-23 | 728 | US-CERT Vulnerability Summary for the Week of September 16, 2024 - RedPacket Security | ||
Details | Website | 2024-09-17 | 0 | iOS 18 and iPadOS 18: Apple Intelligence and Enterprise Features | ||
Details | Website | 2024-09-10 | 28 | Retail Targeted Campaigns—Domain Fraud, Brand Impersonation, and Ponzi Schemes, oh my! - DomainTools | Start Here. Know Now. |