Common Information
Type Value
Value
Screen Capture
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
Details Published Attributes CTI Title
Details Website 2023-09-14 41 Tatar-Language Users in the Crosshairs of Python Screenshotter
Details Website 2023-09-11 47 From ERMAC to Hook: Investigating the technical differences between two Android malware variants
Details Website 2023-08-29 23 Think Before You Scan: The Rise of QR Codes in Phishing
Details Website 2023-08-25 13 LOLBins Demo: The Quieter Way
Details Website 2023-08-25 195 Russia/Ukraine Update - August 2023
Details Website 2023-08-23 45 The Persistent Danger of Remcos RAT - CYFIRMA
Details Website 2023-08-13 69 MoustachedBouncer: Belarus-Linked threat group exploit ISPs for AiTM attacks
Details Website 2023-08-09 14 July 2023’s Most Wanted Malware: Remote Access Trojan (RAT) Remcos Climbs to Third Place while Mobile Malware Anubis Returns to Top Spot - Check Point Blog
Details Website 2023-07-25 81 Apple Crimeware | Massive Rust Infostealer Campaign Aiming for macOS Sonoma Ahead of Public Release
Details Website 2023-07-18 2 A Malware retrospective: SubSeven
Details Website 2023-07-06 239 Increased Truebot Activity Infects U.S. and Canada Based Networks | CISA
Details Website 2023-06-27 4 NAPLISTENER: more bad dreams from developers of SIESTAGRAPH — Elastic Security Labs
Details Website 2023-06-23 100 Securonix Threat Labs Security Advisory: New MULTI#STORM Attack Campaign Involving Python-based Loader Masquerading as OneDrive Utilities Dropping Multiple RAT Payloads Using Security Analytics
Details Website 2023-06-22 1 New education apps and accessible content for Chromebooks
Details Website 2023-06-22 0 New Google for Education tools for how you teach, learn and manage
Details Website 2023-06-21 22 Initial research exposing JOKERSPY — Elastic Security Labs
Details Website 2023-06-17 43 Rewterz Threat Alert – Unveiling the Attacks by White Elephant Group: Exploiting BADNEWS and Remcos Commercial Trojans – Active IOCs
Details Website 2023-06-15 37 eSentire Threat Intelligence Malware Analysis: Aurora Stealer
Details Website 2023-06-13 0 Top 15 Browser Extensions For OSINT Researchers.
Details Website 2023-06-12 19 几种Windows录屏技巧 – 绿盟科技技术博客
Details Website 2023-06-09 0 Stealth Soldier: A New Custom Backdoor Targets North Africa with Espionage Attacks
Details Website 2023-06-09 39 Rewterz Threat Alert – North Africa Targeted by a New Custom Backdoor “Stealth Soldier” – Active IOCs
Details Website 2023-06-09 12 May 2023’s Most Wanted Malware: New Version of Guloader Delivers Encrypted Cloud-Based Payloads - Check Point Blog
Details Website 2023-06-08 30 Monthly Threat Actor Group Intelligence Report, April 2023 (KOR) – Red Alert
Details Website 2023-06-07 176 #StopRansomware: CL0P Ransomware Gang Exploits CVE-2023-34362 MOVEit Vulnerability | CISA