Common Information
Type Value
Value
Screen Capture - T1513
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015)
Details Published Attributes CTI Title
Details Website 2024-04-10 1 The iSOON Disclosure: Exploring the Integrated Operations Platform
Details Website 2024-04-04 67 BlueDuck: an(other) Infostealer Coveting Digital Marketing Agencies’ Facebook Business Accounts
Details Website 2024-03-21 15 Curious Serpens’ FalseFont Backdoor: Technical Analysis, Detection and Prevention
Details Website 2024-03-01 21 A comprehensive analysis of I-Soon's commercial offering
Details Website 2024-02-14 46 Hamas-linked SameCoin campaign malware analysis
Details Website 2023-12-06 198 Russia/Ukraine Update - December 2023
Details Website 2023-11-19 117 LitterDrifter: a new USB worm used by the Gamaredon group
Details Website 2023-11-14 37 FBI Takedown: IPStorm Botnet Infrastructure Dismantled
Details Website 2023-11-10 4 How to manually update Microsoft Defender
Details Website 2023-11-08 26 October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign - Check Point Blog
Details Website 2023-11-06 203 SideCopy’s Multi-platform Onslaught: Leveraging WinRAR Zero-Day and Linux Variant of Ares RAT - Blogs on Information Technology, Network & Cybersecurity | Seqrite
Details Website 2023-11-02 27 New Java-Based Sayler RAT Targets Polish Speaking Users
Details Website 2023-11-01 23 Monthly Threat Actor Group Intelligence Report, August 2023 (ENG) – Red Alert
Details Website 2023-11-01 42 DoNot APT expands its arsenal to spy on victim's VoIP calls
Details Website 2023-10-31 54 Arid Viper disguising mobile spyware as updates for non-malicious Android applications
Details Website 2023-10-23 273 Red Team Tools
Details Website 2023-10-20 59 Akira Stealer : An Undetected Python Based Info-stealer - CYFIRMA
Details Website 2023-10-18 27 Fileless Pure Clipper Malware: Italian users in the crosshairs
Details Website 2023-10-11 21 Monthly Threat Actor Group Intelligence Report, August 2023 (KOR) – Red Alert
Details Website 2023-10-05 6 APT Profile: Dark Pink APT Group
Details Website 2023-09-29 25 The Thin Line: Educational Tools vs. Malicious Threats - A Focus on The-Murk-Stealer - CYFIRMA
Details Website 2023-09-26 33 ZenRAT: Malware Brings More Chaos Than Calm  | Proofpoint US
Details Website 2023-09-20 37 Indian Taxpayers face a Multifaceted Threat with Drinik Malware's Return
Details Website 2023-09-19 26 Monthly Threat Actor Group Intelligence Report, July 2023 (KOR) – Red Alert
Details Website 2023-09-17 36 RedLine Stealer : A new variant surfaces, Deploying using Batch Script - CYFIRMA