Common Information
Type | Value |
---|---|
Value |
Screen Capture - T1513 |
Category | Attack-Pattern |
Type | Mitre-Attack-Pattern |
Misp Type | Cluster |
Description | Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android `MediaProjectionManager` (generally requires the device user to grant consent).(Citation: Fortinet screencap July 2019)(Citation: Android ScreenCap1 2019) Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.(Citation: Lookout-Monokle) An adversary with root access or Android Debug Bridge (adb) access could call the Android `screencap` or `screenrecord` commands.(Citation: Android ScreenCap2 2019)(Citation: Trend Micro ScreenCap July 2015) |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-01-02 | 47 | Dark Web Profile: MuddyWater APT Group - SOCRadar | ||
Details | Website | 2023-01-01 | 123 | The Mac Malware of 2022 👾 | ||
Details | Website | 2022-12-22 | 175 | New RisePro Stealer distributed by the prominent PrivateLoader | ||
Details | Website | 2022-12-16 | 70 | SiestaGraph: New implant uncovered in ASEAN member foreign ministry — Elastic Security Labs | ||
Details | Website | 2022-12-12 | 69 | Dark Web Profile: APT42 - Iranian Cyber Espionage Group - SOCRadar | ||
Details | Website | 2022-12-08 | 93 | DeathStalker targets legal entities with new Janicab variant | ||
Details | Website | 2022-11-30 | 149 | 奇安信威胁情报中心 | ||
Details | Website | 2022-11-30 | 34 | Redline Stealer being Distributed via Fake Express VPN Sites | ||
Details | Website | 2022-11-21 | 117 | Aurora: a rising stealer flying under the radar | ||
Details | Website | 2022-10-30 | 2 | Drinik Malware With Advanced Capabilities Targeting 18 Indian Banks - GBHackers On Security | ||
Details | Website | 2022-10-20 | 68 | Infostealer Distributed Using Bundled Installer | ||
Details | Website | 2022-10-18 | 45 | Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More | ||
Details | Website | 2022-10-11 | 97 | POLONIUM targets Israel with Creepy malware | WeLiveSecurity | ||
Details | Website | 2022-10-09 | 1 | Le tour des actus cybersécurité | 9 oct 2022 - Le décodeur de cybersécurité | ||
Details | Website | 2022-10-06 | 15 | Evolution of BazarCall Social Engineering Tactics | ||
Details | Website | 2022-10-06 | 15 | Evolution of BazarCall Social Engineering Tactics | ||
Details | Website | 2022-10-06 | 15 | Evolution of BazarCall Social Engineering Tactics | ||
Details | Website | 2022-10-03 | 651 | Vulnerability Summary for the Week of September 26, 2022 | CISA | ||
Details | Website | 2022-09-28 | 2 | Cybersecurity Investments vs. Actual Risk and Cyber Risk Mitigation | ||
Details | Website | 2022-09-28 | 3 | Prilex: Brazilian PoS malware evolution | ||
Details | Website | 2022-09-27 | 372 | Farbar Managed By Your Organization IntelligentPwdlessTask - Virus, Trojan, Spyware, and Malware Removal Help | ||
Details | Website | 2022-09-26 | 4 | Malware Posing as Russia DDoS Tool Bites Ukraine Hackers | Black Hat Ethical Hacking | ||
Details | Website | 2022-09-26 | 81 | PlugX: A Talisman to Behold | ||
Details | Website | 2022-09-17 | 33 | Fake Telegram site delivering RAT aimed at Chinese Users | ||
Details | Website | 2022-09-15 | 41 | Erbium Stealer, a new Infostealer enters the scene |