Common Information
Type | Value |
---|---|
Value |
Screen Capture |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-03-23 | 68 | Cinoshi Project and the Dark Side of Free MaaS | ||
Details | Website | 2023-03-16 | 121 | Not‑so‑private messaging: Trojanized WhatsApp and Telegram apps go after cryptocurrency wallets | WeLiveSecurity | ||
Details | Website | 2023-03-16 | 252 | Peeking at Reaper’s surveillance operations | ||
Details | Website | 2023-03-14 | 59 | The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia | WeLiveSecurity | ||
Details | Website | 2023-03-14 | 36 | Anomali Cyber Watch: Xenomorph Automates The Whole Fraud Chain on Android, IceFire Ransomware Started Targeting Linux, Mythic Leopard Delivers Spyware Using Romance Scam | ||
Details | Website | 2023-03-13 | 0 | Remcos Trojan back on Check Point’s top 10 list of global threats | IT World Canada News | ||
Details | Website | 2023-03-09 | 11 | February 2023’s Most Wanted Malware: Remcos Trojan Linked to Cyberespionage Operations Against Ukrainian Government - Check Point Software | ||
Details | Website | 2023-03-03 | 20 | Monthly Threat Actor Group Intelligence Report, January 2023 (KOR) – Red Alert | ||
Details | Website | 2023-03-02 | 0 | Fortinet is Named a Visionary in the Gartner® Magic Quadrant™ for Endpoint Protection Platforms | Fortinet Blog | ||
Details | Website | 2023-03-02 | 199 | Russia/Ukraine Update - February 2023 | ||
Details | Website | 2023-03-01 | 5 | Hunting for Suspicious Windows Libraries for Execution and Defense Evasion — Elastic Security Labs | ||
Details | Website | 2023-03-01 | 1 | Two Hacking Groups Seen Targeting Materials Sector in Asia | ||
Details | Website | 2023-02-25 | 5 | Five Cybersecurity Threats Affecting Businesses in February 2023 | Marcum LLP | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security | ||
Details | Website | 2023-02-21 | 8 | Built-in macOS Security Tools | ||
Details | Website | 2023-02-20 | 215 | Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity - Part 1 | ||
Details | Website | 2023-02-17 | 49 | The Many Faces of Qakbot Malware: A Look at Its Diverse Distribution Methods | ||
Details | Website | 2023-02-13 | 261 | Dalbit (m00nlight): Chinese Hacker Group's APT Attack Campaign - ASEC BLOG | ||
Details | Website | 2023-02-06 | 94 | Collect, Exfiltrate, Sleep, Repeat - The DFIR Report | ||
Details | Website | 2023-02-03 | 14 | TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users | ||
Details | Website | 2023-02-03 | 20 | TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users | ||
Details | Website | 2023-01-27 | 380 | Threat Round up for January 20 to January 27 | ||
Details | Website | 2023-01-26 | 49 | The Godfather Banking Trojan Expands Application Targeting to Affect More Europe-Based Victims | ||
Details | Website | 2023-01-16 | 0 | The Most Popular Methods By Which Ransomware Is Delivered And Deployed | ||
Details | Website | 2023-01-13 | 425 | Threat Round up for January 6 to January 13 | ||
Details | Website | 2023-01-06 | 29 | Distribution of NetSupport RAT Malware Disguised as a Pokemon Game - ASEC BLOG |