Common Information
Type | Value |
---|---|
Value |
Screen Capture |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices. |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-01-02 | 47 | Dark Web Profile: MuddyWater APT Group - SOCRadar | ||
Details | Website | 2023-01-01 | 123 | The Mac Malware of 2022 👾 | ||
Details | Website | 2022-12-22 | 175 | New RisePro Stealer distributed by the prominent PrivateLoader | ||
Details | Website | 2022-12-16 | 70 | SiestaGraph: New implant uncovered in ASEAN member foreign ministry — Elastic Security Labs | ||
Details | Website | 2022-12-12 | 69 | Dark Web Profile: APT42 - Iranian Cyber Espionage Group - SOCRadar | ||
Details | Website | 2022-12-08 | 93 | DeathStalker targets legal entities with new Janicab variant | ||
Details | Website | 2022-11-30 | 149 | 奇安信威胁情报中心 | ||
Details | Website | 2022-11-30 | 34 | Redline Stealer being Distributed via Fake Express VPN Sites | ||
Details | Website | 2022-11-21 | 117 | Aurora: a rising stealer flying under the radar | ||
Details | Website | 2022-10-30 | 2 | Drinik Malware With Advanced Capabilities Targeting 18 Indian Banks - GBHackers On Security | ||
Details | Website | 2022-10-20 | 68 | Infostealer Distributed Using Bundled Installer | ||
Details | Website | 2022-10-18 | 45 | Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More | ||
Details | Website | 2022-10-11 | 97 | POLONIUM targets Israel with Creepy malware | WeLiveSecurity | ||
Details | Website | 2022-10-09 | 1 | Le tour des actus cybersécurité | 9 oct 2022 - Le décodeur de cybersécurité | ||
Details | Website | 2022-10-06 | 15 | Evolution of BazarCall Social Engineering Tactics | ||
Details | Website | 2022-10-06 | 15 | Evolution of BazarCall Social Engineering Tactics | ||
Details | Website | 2022-10-06 | 15 | Evolution of BazarCall Social Engineering Tactics | ||
Details | Website | 2022-10-03 | 651 | Vulnerability Summary for the Week of September 26, 2022 | CISA | ||
Details | Website | 2022-09-28 | 2 | Cybersecurity Investments vs. Actual Risk and Cyber Risk Mitigation | ||
Details | Website | 2022-09-28 | 3 | Prilex: Brazilian PoS malware evolution | ||
Details | Website | 2022-09-27 | 372 | Farbar Managed By Your Organization IntelligentPwdlessTask - Virus, Trojan, Spyware, and Malware Removal Help | ||
Details | Website | 2022-09-26 | 4 | Malware Posing as Russia DDoS Tool Bites Ukraine Hackers | Black Hat Ethical Hacking | ||
Details | Website | 2022-09-26 | 81 | PlugX: A Talisman to Behold | ||
Details | Website | 2022-09-17 | 33 | Fake Telegram site delivering RAT aimed at Chinese Users | ||
Details | Website | 2022-09-15 | 41 | Erbium Stealer, a new Infostealer enters the scene |