Common Information
Type Value
Value
Video Capture - T1512
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description An adversary can leverage a device’s cameras to gather information by capturing video recordings. Images may also be captured, potentially in specified intervals, in lieu of video files. Malware or scripts may interact with the device cameras through an available API provided by the operating system. Video or image files may be written to disk and exfiltrated later. This technique differs from [Screen Capture](https://attack.mitre.org/techniques/T1513) due to use of the device’s cameras for video recording rather than capturing the victim’s screen. In Android, an application must hold the `android.permission.CAMERA` permission to access the cameras. In iOS, applications must include the `NSCameraUsageDescription` key in the `Info.plist` file. In both cases, the user must grant permission to the requesting application to use the camera. If the device has been rooted or jailbroken, an adversary may be able to access the camera without knowledge of the user.
Details Published Attributes CTI Title
Details Website 2024-11-15 38 Dark Web Profile: Cadet Blizzard
Details Website 2024-10-30 0 🚨 Android Alert: FakeCall Malware Hijacks Bank Calls to Steal Sensitive Data! 🚨
Details Website 2024-10-30 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware
Details Website 2024-10-30 154 Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T.
Details Website 2024-10-29 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware - Zimperium
Details Website 2024-10-10 29 Technical Analysis of DarkVision RAT
Details Website 2024-10-10 36 Technical Analysis of DarkVision RAT
Details Website 2024-10-10 18 Technical Analysis of DarkVision RAT
Details Website 2024-09-06 13 SafeBreach Coverage for AA24-249A (GRU Unit 29155)
Details Website 2024-09-05 396 Russian Military Cyber Actors Target US and Global Critical Infrastructure | CISA
Details Website 2024-09-05 73 BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
Details Website 2024-09-04 71 AZORult Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog
Details Website 2024-06-13 89 Arid Viper poisons Android apps with AridSpy
Details Website 2024-04-30 64 Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2)
Details Website 2024-02-01 47 VajraSpy: A Patchwork of espionage apps
Details Website 2023-11-06 203 SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT - Blogs on Information Technology, Network & Cybersecurity | Seqrite
Details Website 2023-10-23 273 Red Team Tools
Details Website 2023-05-11 0 Kablolardaki Hacker
Details Website 2023-05-01 47 SeroXen RAT for sale
Details Website 2023-04-05 0 OBS now blocks rogue Windows DLL files, gets improved AV1 support on AMD and Nvidia
Details Website 2023-03-28 32 Anomali Cyber Watch: Bitter Spies on Chinese Nuclear Energy, Kimsuky Takes Over Google Account to Infect Connected Android Devices, Bad Magic APT Targets Occupied Parts of Ukraine
Details Website 2023-03-14 36 Anomali Cyber Watch: Xenomorph Automates The Whole Fraud Chain on Android, IceFire Ransomware Started Targeting Linux, Mythic Leopard Delivers Spyware Using Romance Scam
Details Website 2023-01-17 12 Gone Phishing: Hunting for Malicious Industrial-Themed Emails to Prevent Operational Technology Compromises | Mandiant
Details Website 2023-01-10 0 MSI Afterburner Project 'Probably Dead' Due To Russia-Ukraine War
Details Website 2022-11-24 3 Beware of fake MSI Afterburner that installs cryptojacking and information-stealing malware