Common Information
Type Value
Value
Screen Capture
Category Attack-Pattern
Type Mitre-Ics-Techniques
Misp Type Cluster
Description Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
Details Published Attributes CTI Title
Details Website 2023-01-02 47 Dark Web Profile: MuddyWater APT Group - SOCRadar
Details Website 2023-01-01 123 The Mac Malware of 2022 👾
Details Website 2022-12-22 175 New RisePro Stealer distributed by the prominent PrivateLoader
Details Website 2022-12-16 70 SiestaGraph: New implant uncovered in ASEAN member foreign ministry — Elastic Security Labs
Details Website 2022-12-12 69 Dark Web Profile: APT42 - Iranian Cyber Espionage Group - SOCRadar
Details Website 2022-12-08 93 DeathStalker targets legal entities with new Janicab variant
Details Website 2022-11-30 149 奇安信威胁情报中心
Details Website 2022-11-30 34 Redline Stealer being Distributed via Fake Express VPN Sites
Details Website 2022-11-21 117 Aurora: a rising stealer flying under the radar
Details Website 2022-10-30 2 Drinik Malware With Advanced Capabilities Targeting 18 Indian Banks - GBHackers On Security
Details Website 2022-10-20 68 Infostealer Distributed Using Bundled Installer
Details Website 2022-10-18 45 Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More
Details Website 2022-10-11 97 POLONIUM targets Israel with Creepy malware | WeLiveSecurity
Details Website 2022-10-09 1 Le tour des actus cybersécurité | 9 oct 2022 - Le décodeur de cybersécurité
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-03 651 Vulnerability Summary for the Week of September 26, 2022 | CISA
Details Website 2022-09-28 2 Cybersecurity Investments vs. Actual Risk and Cyber Risk Mitigation
Details Website 2022-09-28 3 Prilex: Brazilian PoS malware evolution
Details Website 2022-09-27 372 Farbar Managed By Your Organization IntelligentPwdlessTask - Virus, Trojan, Spyware, and Malware Removal Help
Details Website 2022-09-26 4 Malware Posing as Russia DDoS Tool Bites Ukraine Hackers | Black Hat Ethical Hacking
Details Website 2022-09-26 81 PlugX: A Talisman to Behold
Details Website 2022-09-17 33 Fake Telegram site delivering RAT aimed at Chinese Users
Details Website 2022-09-15 41 Erbium Stealer, a new Infostealer enters the scene