Common Information
Type | Value |
---|---|
Value |
Video Capture - T1125 |
Category | Attack-Pattern |
Type | Mitre-Enterprise-Attack-Attack-Pattern |
Misp Type | Cluster |
Description | An adversary can leverage a computer's peripheral devices (e.g., integrated cameras or webcams) or applications (e.g., video call services) to capture video recordings for the purpose of gathering information. Images may also be captured from devices or applications, potentially in specified intervals, in lieu of video files. Malware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture video or images. Video or image files may be written to disk and exfiltrated later. This technique differs from Screen Capture due to use of specific devices or applications for video recording rather than capturing the victim's screen. In macOS, there are a few different malware samples that record the user's webcam such as FruitFly and Proton. (Citation: objective-see 2017 review) Detection: Detection of this technique may be difficult due to the various APIs that may be used. Telemetry data regarding API use may not be useful depending on how a system is normally used, but may provide context to other potentially malicious activity occurring on a system. Behavior that could indicate technique use include an unknown or unusual process accessing APIs associated with devices or software that interact with the video camera, recording devices, or recording software, and a process periodically writing files to disk that contain video or camera image data. Platforms: Windows, macOS Data Sources: Process monitoring, File monitoring, API monitoring Permissions Required: User Contributors: Praetorian |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2024-11-15 | 38 | Dark Web Profile: Cadet Blizzard | ||
Details | Website | 2024-10-30 | 0 | 🚨 Android Alert: FakeCall Malware Hijacks Bank Calls to Steal Sensitive Data! 🚨 | ||
Details | Website | 2024-10-30 | 27 | Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware | ||
Details | Website | 2024-10-30 | 154 | Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T. | ||
Details | Website | 2024-10-29 | 27 | Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware - Zimperium | ||
Details | Website | 2024-10-10 | 29 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 36 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-10-10 | 18 | Technical Analysis of DarkVision RAT | ||
Details | Website | 2024-09-06 | 13 | SafeBreach Coverage for AA24-249A (GRU Unit 29155) | ||
Details | Website | 2024-09-05 | 396 | Russian Military Cyber Actors Target US and Global Critical Infrastructure | CISA | ||
Details | Website | 2024-09-05 | 73 | BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar | ||
Details | Website | 2024-09-04 | 71 | AZORult Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog | ||
Details | Website | 2024-06-13 | 89 | Arid Viper poisons Android apps with AridSpy | ||
Details | Website | 2024-04-30 | 64 | Deep Analysis of SecretCalls, A formidable app for notorious Korean financial fraudsters (Part 2) | ||
Details | Website | 2024-02-01 | 47 | VajraSpy: A Patchwork of espionage apps | ||
Details | Website | 2023-11-06 | 203 | SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT - Blogs on Information Technology, Network & Cybersecurity | Seqrite | ||
Details | Website | 2023-10-23 | 273 | Red Team Tools | ||
Details | Website | 2023-05-11 | 0 | Kablolardaki Hacker | ||
Details | Website | 2023-05-01 | 47 | SeroXen RAT for sale | ||
Details | Website | 2023-04-05 | 0 | OBS now blocks rogue Windows DLL files, gets improved AV1 support on AMD and Nvidia | ||
Details | Website | 2023-01-17 | 12 | Gone Phishing: Hunting for Malicious Industrial-Themed Emails to Prevent Operational Technology Compromises | Mandiant | ||
Details | Website | 2023-01-10 | 0 | MSI Afterburner Project 'Probably Dead' Due To Russia-Ukraine War | ||
Details | Website | 2022-11-24 | 3 | Beware of fake MSI Afterburner that installs cryptojacking and information-stealing malware | ||
Details | Website | 2022-10-11 | 97 | POLONIUM targets Israel with Creepy malware | WeLiveSecurity | ||
Details | Website | 2022-09-07 | 33 | MagicRAT: Lazarus’ latest gateway into victim networks |