Common Information
Type Value
Value
Screen Capture - T1513
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015)
Details Published Attributes CTI Title
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis
Details Website 2024-11-13 55 HawkEye Malware: Technical Analysis - ANY.RUN's Cybersecurity Blog
Details Website 2024-11-13 55 HawkEye | PredatorPain
Details Website 2024-11-11 0 Game Over
Details Website 2024-11-08 0 Revolutionize Your Business With These Must-Have Computer Monitoring Tools! 🚀
Details Website 2024-11-06 0 Winos4.0 Malware Found in Game Apps, Targets Windows Users
Details Website 2024-11-04 35 G700 : The Next Generation of Craxs RAT - CYFIRMA
Details Website 2024-11-04 38 Monthly Threat Actor Group Intelligence Report, September 2024 (KOR)
Details Website 2024-11-04 14 Monthly Threat Actor Group Intelligence Report, August 2024 (JPN)
Details Website 2024-11-04 16 Monthly Threat Actor Group Intelligence Report, August 2024 (JPN) – Red Alert
Details Website 2024-11-04 38 Monthly Threat Actor Group Intelligence Report, September 2024 (KOR) – Red Alert
Details Website 2024-11-01 7 New LightSpy spyware version targets iPhones
Details Website 2024-10-31 0 Streamline IT Support with Image Analysis - SysAid
Details Website 2024-10-30 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware
Details Website 2024-10-30 154 Крысиный король: как Android-троян CraxsRAT ворует данные пользователей | Блог F.A.C.C.T.
Details Website 2024-10-29 27 Mishing in Motion: Uncovering the Evolving Functionality of FakeCall Malware - Zimperium
Details Website 2024-10-29 22 Notorious WrnRAT Delivered Mimic As Gambling Games
Details Website 2024-10-29 2 Notorious WrnRAT Delivered Mimic As Gambling Games
Details Website 2024-10-29 207 WarmCookie Malware Threat Intel
Details Website 2024-10-29 14 Monthly Threat Actor Group Intelligence Report, July 2024 (JPN)
Details Website 2024-10-29 16 Monthly Threat Actor Group Intelligence Report, July 2024 (JPN) – Red Alert
Details Website 2024-10-29 28 Monthly Threat Actor Group Intelligence Report, August 2024 (ENG) – Red Alert
Details Website 2024-10-28 67 Apple Updates Everything - SANS Internet Storm Center
Details Website 2024-10-23 44 Highlighting TA866/Asylum Ambuscade Activity Since 2021
Details Website 2024-10-21 4 WrnRAT Distributed Under the Guise of Gambling Games - ASEC