Common Information
Type Value
Value
Screen Capture - T1513
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015)
Details Published Attributes CTI Title
Details Website 2016-05-02 77 Prince of Persia: Infy Malware Active In Decade of Targeted Attacks
Details Website 2016-03-23 23 SamSam: The Doctor Will See You, After He Pays The Ransom
Details Website 2016-02-09 15 Bedep Lurking in Angler's Shadows
Details Website 2016-01-29 12 Malicious Office Files Dropping Kasidet And Dridex | Zscaler
Details Website 2015-03-12 19 Integer overflow leading to heap corruption while unflattening GraphicBuffer In Android(CVE-2015-1474)
Details Website 2014-12-09 5 Changing Server Installation Option from Server Core to Server-Gui-Shell
Details Website 2014-08-16 2 Blue Banana RAT
Details Website 2014-08-03 0 Biodox RAT
Details Website 2014-06-18 20 One VPN to rule them all | Malwarebytes Labs
Details Website 2014-05-11 35 Backdoor Xtrat Continues To Evade Detection | Zscaler
Details Website 2014-03-26 65 New Metasploit 4.9 Helps Evade Anti-Virus Solutions, Test Network Segmentation, and Increase Productivity for Penetration Testers | Rapid7 Blog
Details Website 2014-02-17 167 Mapping Hacking Team’s “Untraceable” Spyware
Details Website 2014-01-08 3 Windows Server 2012 R2 Installation Options and Features on Demand (Part 2 of 5)
Details Website 2013-11-21 4 A journey in script-kiddie-land and kernel-land — A little bit of everything
Details Website 2013-08-23 0 Poison Ivy Attack Toolkit With Ties To China Linked To Other Hacking Groups | CRN
Details Website 2013-02-11 2 SensePost | Poking around in android memory
Details Website 2012-09-17 5 Unplugging PlugX Capabilities
Details Website 2012-07-27 65 The ‘Madi’ infostealers – a detailed analysis
Details Website 2012-02-21 6 The Art of Keylogging with Metasploit & Javascript | Rapid7 Blog
Details Website 2010-05-18 1 Metasploit Framework 3.4.0 Released! | Rapid7 Blog
Details Website 2010-01-13 128 This Week in Avalanche / Zbot / Zeus Bot: HSBC & eBay
Details Website 2009-01-29 39 [Emerging-Sigs] Gozi/Ordergun/Orderjack sig mod + new
Details Website 2007-08-28 0 Refog Free Keylogger - KGB Key Logger Review - Darknet - Hacking Tools, Hacker News & Cyber Security