Common Information
Type Value
Value
Screen Capture - T1113
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. ===Mac=== On OSX, the native command <code>screencapture</code> is used to capture screenshots. ===Linux=== On Linux, there is the native command <code>xwd</code>. (Citation: Antiquated Mac Malware) Detection: Monitoring for screen capture behavior will depend on the method used to obtain data from the operating system and write output files. Detection methods could include collecting information from unusual processes using API calls used to obtain image data, and monitoring for image files written to disk. The sensor data may need to be correlated with other events to identify malicious activity, depending on the legitimacy of this behavior within a given network environment. Platforms: Linux, macOS, Windows Data Sources: API monitoring, Process monitoring, File monitoring
Details Published Attributes CTI Title
Details Website 2024-09-17 0 iOS 18 and iPadOS 18: Apple Intelligence and Enterprise Features
Details Website 2024-09-10 28 Retail Targeted Campaigns—Domain Fraud, Brand Impersonation, and Ponzi Schemes, oh my! - DomainTools | Start Here. Know Now.
Details Website 2024-09-09 22 Dive into Sigma Correlation Rules
Details Website 2024-09-07 2 Why Polarity & ThreatConnect? | ThreatConnect
Details Website 2024-09-02 15 CYFIRMA RESEARCH : POWERSHELL KEYLOGGER - CYFIRMA
Details Website 2024-08-29 24 Monthly Threat Actor Group Intelligence Report, July 2024 (KOR) – Red Alert
Details Website 2024-08-27 3 AutoIT Bot Targets Gmail Accounts First | SonicWall
Details Website 2024-08-27 77 LightSpy: Implant for macOS
Details Website 2024-08-22 134 Technical Analysis of Copybara
Details Website 2024-08-14 6 PrestaShop GTAG Websocket Skimmer
Details Website 2024-08-13 7 Kaspersky report on APT trends in Q2 2024
Details Website 2024-08-12 0 Remexi Backdoor
Details Website 2024-08-10 89 Sidewinder APT – 针对巴基斯坦的网络钓鱼 | CTF导航
Details Website 2024-08-09 0 Weekly Cyber Threat Intelligence Summary
Details Website 2024-08-05 65 LianSpy: Android spyware leveraging Yandex Disk as C2
Details Website 2024-08-01 34 BlankBot - a new Android banking trojan with screen recording,…
Details Website 2024-08-01 47 BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor — Elastic Security Labs
Details Website 2024-07-25 59 How APT groups operate in Southeast Asia
Details Website 2024-07-17 9 Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
Details Website 2024-07-15 42 CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
Details Website 2024-07-12 0 RAT Catchers - What are We Up Against? - Packt SecPro
Details Website 2024-07-01 62 Kimsuky deploys TRANSLATEXT to target South Korean academia
Details Website 2024-06-27 0 Recovering from a MITRE hangover
Details Website 2024-06-25 47 How to detect the modular RAT CSHARP-STREAMER
Details Website 2024-06-19 172 Behind the Great Wall Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 CC Framework