Common Information
Type Value
Value
Screen Capture
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
Details Published Attributes CTI Title
Details Website 2024-04-10 1 The iSOON Disclosure: Exploring the Integrated Operations Platform
Details Website 2024-04-04 67 BlueDuck: an(other) Infostealer Coveting Digital Marketing Agencies’ Facebook Business Accounts
Details Website 2024-03-21 15 Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention
Details Website 2024-03-01 21 A comprehensive analysis of I-Soon's commercial offering
Details Website 2024-02-14 46 Hamas-linked SameCoin campaign malware analysis
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-11-19 117 LitterDrifter: a new USB worm used by the Gamaredon group
Details Website 2023-11-14 37 FBI Takedown: IPStorm Botnet Infrastructure Dismantled
Details Website 2023-11-10 4 How to manually update Microsoft Defender
Details Website 2023-11-08 26 October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign - Check Point Blog
Details Website 2023-11-06 203 SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT - Blogs on Information Technology, Network & Cybersecurity | Seqrite
Details Website 2023-11-02 27 New Java-Based Sayler RAT Targets Polish Speaking Users
Details Website 2023-11-01 23 Monthly Threat Actor Group Intelligence Report, August 2023 (ENG) – Red Alert
Details Website 2023-11-01 42 DoNot APT expands its arsenal to spy on victim's VoIP calls
Details Website 2023-10-31 54 Arid Viper disguising mobile spyware as updates for non-malicious Android applications
Details Website 2023-10-23 273 Red Team Tools
Details Website 2023-10-20 59 Akira Stealer : An Undetected Python Based Info-stealer - CYFIRMA
Details Website 2023-10-18 27 Fileless Pure Clipper Malware: Italian users in the crosshairs
Details Website 2023-10-11 21 Monthly Threat Actor Group Intelligence Report, August 2023 (KOR) – Red Alert
Details Website 2023-10-05 6 APT Profile: Dark Pink APT Group
Details Website 2023-09-29 25 The Thin Line: Educational Tools vs. Malicious Threats - A Focus on The-Murk-Stealer - CYFIRMA
Details Website 2023-09-26 33 ZenRAT: Malware Brings More Chaos Than Calm  | Proofpoint US
Details Website 2023-09-20 37 Indian Taxpayers face a Multifaceted Threat with Drinik Malware's Return
Details Website 2023-09-19 26 Monthly Threat Actor Group Intelligence Report, July 2023 (KOR) – Red Alert
Details Website 2023-09-17 36 RedLine Stealer : A new variant surfaces, Deploying using Batch Script - CYFIRMA