Common Information
Type Value
Value
Screen Capture
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
Details Published Attributes CTI Title
Details Website 2024-10-19 1 Firejail: Your First Line of Defense for Linux Application Security
Details Website 2024-10-15 0 New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT
Details Website 2024-10-15 0 New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT - RedPacket Security
Details Website 2024-10-14 1 TrickMo Malware Attacking Android Devices To Steal Unlock Patterns And PINs
Details Website 2024-10-14 55 Hidden In Plain Sight: How ErrorFather Deploys Cerberus To Amplify Cyber Threats
Details Website 2024-10-14 1 Lab 3: The Hunt for Lost Files — Adventures in File Recovery
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples
Details Website 2024-10-11 30 Expanding the Investigation: Deep Dive into Latest TrickMo Samples - Zimperium
Details Website 2024-10-10 29 Technical Analysis of DarkVision RAT
Details Website 2024-10-10 36 Technical Analysis of DarkVision RAT
Details Website 2024-10-10 33 Malware by the (Bit)Bucket: Uncovering AsyncRAT
Details Website 2024-10-10 26 Monthly Threat Actor Group Intelligence Report, August 2024 (KOR)
Details Website 2024-10-10 26 Monthly Threat Actor Group Intelligence Report, July 2024 (ENG) – Red Alert
Details Website 2024-10-10 26 Monthly Threat Actor Group Intelligence Report, August 2024 (KOR) – Red Alert
Details Website 2024-10-10 18 Technical Analysis of DarkVision RAT
Details Website 2024-10-09 0 ISM’s Guidelines for Enterprise Mobility - Zimperium
Details Website 2024-10-04 100 Агент SIEM используется в атаках SilentCryptoMiner
Details Website 2024-10-04 100 SIEM agent being used in SilentCryptoMiner attacks
Details Website 2024-10-01 9 Detecting Vulnerability Scanning Traffic From Underground Tools Using Machine Learning
Details Website 2024-10-01 153 LightSpy: Implant for iOS
Details Website 2024-09-27 58 OSINT Investigation: Hunting Malicious Infrastructure Linked to Transparent Tribe - CYFIRMA
Details Website 2024-09-26 5 China-linked APT group Salt Typhoon compromised some US ISPs
Details Website 2024-09-23 728 US-CERT Vulnerability Summary for the Week of September 16, 2024 - RedPacket Security
Details Website 2024-09-17 0 iOS 18 and iPadOS 18: Apple Intelligence and Enterprise Features
Details Website 2024-09-10 28 Retail Targeted Campaigns—Domain Fraud, Brand Impersonation, and Ponzi Schemes, oh my! - DomainTools | Start Here. Know Now.