Common Information
Type | Value |
---|---|
Value |
Screen Capture - T1513 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-06-07 | 37 | NukeSped RAT Report - CYFIRMA | ||
Details | Website | 2023-06-02 | 384 | Threat Roundup for May 26 to June 2 | ||
Details | Website | 2023-06-01 | 18 | Do Not Cross The 'RedLine' Stealer: Detections and Analysis | ||
Details | Website | 2023-05-30 | 64 | Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals | ||
Details | Website | 2023-05-30 | 66 | Void Rabisu’s Use of RomCom Backdoor Shows a Growing Shift in Threat Actors’ Goals | ||
Details | Website | 2023-05-26 | 2 | Screencapture.app Virus on Mac – How to Remove It | ||
Details | Website | 2023-05-23 | 29 | Anomali Cyber Watch: CloudWizard Targets Both Sides in Ukraine, Camaro Dragon Trojanized TP-Link Firmware, RA Group Ransomware Copied Babuk | ||
Details | Website | 2023-05-19 | 42 | CapCut Users Under Fire | ||
Details | Website | 2023-05-05 | 352 | Threat Roundup for April 28 to May 5 | ||
Details | Website | 2023-05-04 | 0 | Vulnerability Management Maturity Model – Self-Assessment Tool (VMMM-SAT) | Jonathan Risto | SANS Institute | ||
Details | Website | 2023-04-29 | 2 | Google Adds New Cyber Security Tools & Features to ChromeOS | ||
Details | Website | 2023-04-28 | 300 | Threat Roundup for April 21 to April 28 | ||
Details | Website | 2023-04-28 | 476 | PENTESTING TOOLS AND PROCEDURE | ||
Details | Website | 2023-04-26 | 5 | Strolling through Cyberspace and Hunting for Phishing Sites - SANS Internet Storm Center | ||
Details | Website | 2023-04-25 | 48 | The Claws of Evilcode Gauntlet - XWorm RAT - Avira Blog | ||
Details | Website | 2023-04-25 | 54 | Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server | ||
Details | Website | 2023-04-23 | 2 | Busted: Misconceptions on Insider Risk Programs | ||
Details | Website | 2023-04-10 | 12 | March 2023’s Most Wanted Malware: New Emotet Campaign Bypasses Microsoft Blocks to Distribute Malicious OneNote Files - Check Point Software | ||
Details | Website | 2023-04-05 | 0 | OBS now blocks rogue Windows DLL files, gets improved AV1 support on AMD and Nvidia | ||
Details | Website | 2023-04-04 | 5 | Out of Band NTLM Relay Using Outlook CVE-2023–23397 Vulnerability | ||
Details | Website | 2023-03-28 | 0 | Advanced Presistent Threat(APT) | ||
Details | Website | 2023-03-28 | 32 | Anomali Cyber Watch: Bitter Spies on Chinese Nuclear Energy, Kimsuky Takes Over Google Account to Infect Connected Android Devices, Bad Magic APT Targets Occupied Parts of Ukraine | ||
Details | Website | 2023-03-24 | 398 | Threat Roundup for March 17 to March 24 | ||
Details | Website | 2023-03-24 | 0 | The ‘Acropalypse,’ Chat GPT’s GPT-4, CISA 's Critical Infrastructure Advisories and More | ||
Details | Website | 2023-03-23 | 1 | The dangers of unmonitored community activities. |