Common Information
Type Value
Value
Screen Capture - T1513
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015)
Details Published Attributes CTI Title
Details Website 2024-09-09 22 Dive into Sigma Correlation Rules
Details Website 2024-09-07 2 Why Polarity & ThreatConnect? | ThreatConnect
Details Website 2024-09-02 15 CYFIRMA RESEARCH : POWERSHELL KEYLOGGER - CYFIRMA
Details Website 2024-08-29 24 Monthly Threat Actor Group Intelligence Report, July 2024 (KOR) – Red Alert
Details Website 2024-08-27 3 AutoIT Bot Targets Gmail Accounts First | SonicWall
Details Website 2024-08-27 77 LightSpy: Implant for macOS
Details Website 2024-08-22 134 Technical Analysis of Copybara
Details Website 2024-08-14 6 PrestaShop GTAG Websocket Skimmer
Details Website 2024-08-13 7 Kaspersky report on APT trends in Q2 2024
Details Website 2024-08-12 0 Remexi Backdoor
Details Website 2024-08-09 0 Weekly Cyber Threat Intelligence Summary
Details Website 2024-08-05 65 LianSpy: Android spyware leveraging Yandex Disk as C2
Details Website 2024-08-01 34 BlankBot - a new Android banking trojan with screen recording,…
Details Website 2024-08-01 47 BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor — Elastic Security Labs
Details Website 2024-07-25 59 How APT groups operate in Southeast Asia
Details Website 2024-07-17 9 Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Details Website 2024-07-15 42 CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
Details Website 2024-07-12 0 RAT Catchers - What are We Up Against? - Packt SecPro
Details Website 2024-07-01 62 Kimsuky deploys TRANSLATEXT to target South Korean academia
Details Website 2024-06-27 0 Recovering from a MITRE hangover
Details Website 2024-06-25 47 How to detect the modular RAT CSHARP-STREAMER
Details Website 2024-06-19 172 Behind the Great Wall Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 CC Framework
Details Website 2024-06-12 27 Dipping into Danger: The WARMCOOKIE backdoor — Elastic Security Labs
Details Website 2024-06-10 86 Technical Analysis of the Latest Variant of ValleyRAT
Details Website 2024-05-15 45 To the Moon and back(doors): Lunar landing in diplomatic missions