Common Information
Type | Value |
---|---|
Value |
Screen Capture - T1513 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2022-05-27 | 9 | Phishing Campaign Delivering Three Fileless Malware: AveMariaRAT / BitRAT / PandoraHVNC – Part II | FortiGuard Labs | ||
Details | Website | 2022-05-24 | 87 | Rising Stealer in Q1 2022: BlackGuard Stealer | ||
Details | Website | 2022-05-24 | 24 | Yashma Ransomware, Tracing the Chaos Family Tree | ||
Details | Website | 2022-05-23 | 45 | Deep Analysis of Vidar Stealer | ||
Details | Website | 2022-05-12 | 24 | SCYTHE Library: #ThreatThursday - Buhtrap | ||
Details | Website | 2022-05-11 | 85 | Nerbian RAT Using COVID-19 Themes Features Sophisticated Evasion Techniques | Proofpoint US | ||
Details | Website | 2022-05-05 | 19 | Avast Q1/2022 Threat Report - Avast Threat Labs | ||
Details | Website | 2022-04-29 | 1 | Warning: GRIM and Magnus Android Botnets are Underground | FortiGuard Labs | ||
Details | Website | 2022-04-27 | 202 | A lookback under the TA410 umbrella: Its cyberespionage TTPs and activity | WeLiveSecurity | ||
Details | Website | 2022-04-07 | 54 | MoqHao Part 2: Continued European Expansion | ||
Details | Website | 2022-04-07 | 53 | MoqHao Part 2: Continued European Expansion | ||
Details | Website | 2022-04-06 | 36 | The Latest Remcos RAT Driven By Phishing Campaign | FortiGuard Labs | ||
Details | Website | 2022-03-30 | 100 | New Milestones for Deep Panda: Log4Shell and Digitally Signed Fire Chili Rootkits | ||
Details | Website | 2022-03-16 | 92 | Avira Labs Research Reveals Hydra Banking Trojan 2.0 targeting a wider network of German and Austrian banks | ||
Details | Website | 2022-03-09 | 9 | Threat advisory: Cybercriminals compromise users with malware disguised as pro-Ukraine cyber tools | ||
Details | Website | 2022-03-01 | 13 | Cybereason vs. BlackCat Ransomware | ||
Details | Website | 2022-02-24 | 123 | Iranian Government-Sponsored Actors Conduct Cyber Operations Against Global Government and Commercial Networks | CISA | ||
Details | Website | 2022-02-18 | 21 | PseudoManuscrypt Being Distributed in the Same Method as Cryptbot - ASEC BLOG | ||
Details | Website | 2022-02-15 | 48 | Guard Your Drive from DriveGuard: Moses Staff Campaigns Against Israeli Organizations Span Several Months | FortiGuard Labs | ||
Details | Website | 2022-02-02 | 27 | Catching the RAT called Agent Tesla | Qualys Security Blog | ||
Details | Website | 2022-02-01 | 10 | StrifeWater RAT: Iranian APT Moses Staff Adds New Trojan to Ransomware Operations | ||
Details | Website | 2022-01-25 | 55 | Watering hole deploys new macOS malware, DazzleSpy, in Asia | WeLiveSecurity | ||
Details | Website | 2022-01-20 | 127 | Middle East users targeted by Molerats APT | Zscaler Blog | ||
Details | Website | 2022-01-18 | 158 | DoNot Go! Do not respawn! | WeLiveSecurity | ||
Details | Website | 2022-01-17 | 5 | Android/BianLian payload |