Common Information
Type | Value |
---|---|
Value |
Screen Capture - T1513 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2016-05-02 | 77 | Prince of Persia: Infy Malware Active In Decade of Targeted Attacks | ||
Details | Website | 2016-03-23 | 23 | SamSam: The Doctor Will See You, After He Pays The Ransom | ||
Details | Website | 2016-02-09 | 15 | Bedep Lurking in Angler's Shadows | ||
Details | Website | 2016-01-29 | 12 | Malicious Office Files Dropping Kasidet And Dridex | Zscaler | ||
Details | Website | 2015-03-12 | 19 | Integer overflow leading to heap corruption while unflattening GraphicBuffer In Android(CVE-2015-1474) | ||
Details | Website | 2014-12-09 | 5 | Changing Server Installation Option from Server Core to Server-Gui-Shell | ||
Details | Website | 2014-08-16 | 2 | Blue Banana RAT | ||
Details | Website | 2014-08-03 | 0 | Biodox RAT | ||
Details | Website | 2014-06-18 | 20 | One VPN to rule them all | Malwarebytes Labs | ||
Details | Website | 2014-05-11 | 35 | Backdoor Xtrat Continues To Evade Detection | Zscaler | ||
Details | Website | 2014-03-26 | 65 | New Metasploit 4.9 Helps Evade Anti-Virus Solutions, Test Network Segmentation, and Increase Productivity for Penetration Testers | Rapid7 Blog | ||
Details | Website | 2014-02-17 | 167 | Mapping Hacking Team’s “Untraceable” Spyware | ||
Details | Website | 2014-01-08 | 3 | Windows Server 2012 R2 Installation Options and Features on Demand (Part 2 of 5) | ||
Details | Website | 2013-11-21 | 4 | A journey in script-kiddie-land and kernel-land — A little bit of everything | ||
Details | Website | 2013-08-23 | 0 | Poison Ivy Attack Toolkit With Ties To China Linked To Other Hacking Groups | CRN | ||
Details | Website | 2013-02-11 | 2 | SensePost | Poking around in android memory | ||
Details | Website | 2012-09-17 | 5 | Unplugging PlugX Capabilities | ||
Details | Website | 2012-07-27 | 65 | The ‘Madi’ infostealers – a detailed analysis | ||
Details | Website | 2012-02-21 | 6 | The Art of Keylogging with Metasploit & Javascript | Rapid7 Blog | ||
Details | Website | 2010-05-18 | 1 | Metasploit Framework 3.4.0 Released! | Rapid7 Blog | ||
Details | Website | 2010-01-13 | 128 | This Week in Avalanche / Zbot / Zeus Bot: HSBC & eBay | ||
Details | Website | 2009-01-29 | 39 | [Emerging-Sigs] Gozi/Ordergun/Orderjack sig mod + new | ||
Details | Website | 2007-08-28 | 0 | Refog Free Keylogger - KGB Key Logger Review - Darknet - Hacking Tools, Hacker News & Cyber Security |