Common Information
Type Value
Value
Screen Capture - T1513
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015)
Details Published Attributes CTI Title
Details Website 2023-01-02 47 Dark Web Profile: MuddyWater APT Group - SOCRadar
Details Website 2023-01-01 123 The Mac Malware of 2022 👾
Details Website 2022-12-22 175 New RisePro Stealer distributed by the prominent PrivateLoader
Details Website 2022-12-16 70 SiestaGraph: New implant uncovered in ASEAN member foreign ministry — Elastic Security Labs
Details Website 2022-12-12 69 Dark Web Profile: APT42 - Iranian Cyber Espionage Group - SOCRadar
Details Website 2022-12-08 93 DeathStalker targets legal entities with new Janicab variant
Details Website 2022-11-30 149 奇安信威胁情报中心
Details Website 2022-11-30 34 Redline Stealer being Distributed via Fake Express VPN Sites
Details Website 2022-11-21 117 Aurora: a rising stealer flying under the radar
Details Website 2022-10-30 2 Drinik Malware With Advanced Capabilities Targeting 18 Indian Banks - GBHackers On Security
Details Website 2022-10-20 68 Infostealer Distributed Using Bundled Installer
Details Website 2022-10-18 45 Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More
Details Website 2022-10-11 97 POLONIUM targets Israel with Creepy malware | WeLiveSecurity
Details Website 2022-10-09 1 Le tour des actus cybersécurité | 9 oct 2022 - Le décodeur de cybersécurité
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-03 651 Vulnerability Summary for the Week of September 26, 2022 | CISA
Details Website 2022-09-28 2 Cybersecurity Investments vs. Actual Risk and Cyber Risk Mitigation
Details Website 2022-09-28 3 Prilex: Brazilian PoS malware evolution
Details Website 2022-09-27 372 Farbar Managed By Your Organization IntelligentPwdlessTask - Virus, Trojan, Spyware, and Malware Removal Help
Details Website 2022-09-26 4 Malware Posing as Russia DDoS Tool Bites Ukraine Hackers | Black Hat Ethical Hacking
Details Website 2022-09-26 81 PlugX: A Talisman to Behold
Details Website 2022-09-17 33 Fake Telegram site delivering RAT aimed at Chinese Users
Details Website 2022-09-15 41 Erbium Stealer, a new Infostealer enters the scene