Common Information
Type Value
Value
Screen Capture - T1113
Category Attack-Pattern
Type Mitre-Enterprise-Attack-Attack-Pattern
Misp Type Cluster
Description Adversaries may attempt to take screen captures of the desktop to gather information over the course of an operation. Screen capturing functionality may be included as a feature of a remote access tool used in post-compromise operations. ===Mac=== On OSX, the native command <code>screencapture</code> is used to capture screenshots. ===Linux=== On Linux, there is the native command <code>xwd</code>. (Citation: Antiquated Mac Malware) Detection: Monitoring for screen capture behavior will depend on the method used to obtain data from the operating system and write output files. Detection methods could include collecting information from unusual processes using API calls used to obtain image data, and monitoring for image files written to disk. The sensor data may need to be correlated with other events to identify malicious activity, depending on the legitimacy of this behavior within a given network environment. Platforms: Linux, macOS, Windows Data Sources: API monitoring, Process monitoring, File monitoring
Details Published Attributes CTI Title
Details Website 2023-02-06 94 Collect, Exfiltrate, Sleep, Repeat - The DFIR Report
Details Website 2023-02-03 14 TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users
Details Website 2023-02-03 20 TgToxic Malware’s Automated Framework Targets Southeast Asia Android Users
Details Website 2023-01-27 380 Threat Round up for January 20 to January 27
Details Website 2023-01-26 49 The Godfather Banking Trojan Expands Application Targeting to Affect More Europe-Based Victims
Details Website 2023-01-16 0 The Most Popular Methods By Which Ransomware Is Delivered And Deployed
Details Website 2023-01-13 425 Threat Round up for January 6 to January 13
Details Website 2023-01-06 29 Distribution of NetSupport RAT Malware Disguised as a Pokemon Game - ASEC BLOG
Details Website 2023-01-02 47 Dark Web Profile: MuddyWater APT Group - SOCRadar
Details Website 2023-01-01 123 The Mac Malware of 2022 👾
Details Website 2022-12-22 175 New RisePro Stealer distributed by the prominent PrivateLoader
Details Website 2022-12-16 70 SiestaGraph: New implant uncovered in ASEAN member foreign ministry — Elastic Security Labs
Details Website 2022-12-12 69 Dark Web Profile: APT42 - Iranian Cyber Espionage Group - SOCRadar
Details Website 2022-12-08 93 DeathStalker targets legal entities with new Janicab variant
Details Website 2022-11-30 149 奇安信威胁情报中心
Details Website 2022-11-30 34 Redline Stealer being Distributed via Fake Express VPN Sites
Details Website 2022-11-21 117 Aurora: a rising stealer flying under the radar
Details Website 2022-10-30 2 Drinik Malware With Advanced Capabilities Targeting 18 Indian Banks - GBHackers On Security
Details Website 2022-10-20 68 Infostealer Distributed Using Bundled Installer
Details Website 2022-10-18 45 Anomali Cyber Watch: Ransom Cartel Uses DPAPI Dumping, Unknown China-Sponsored Group Targeted Telecommunications, Alchimist C2 Framework Targets Multiple Operating Systems, and More
Details Website 2022-10-11 97 POLONIUM targets Israel with Creepy malware | WeLiveSecurity
Details Website 2022-10-09 1 Le tour des actus cybersécurité | 9 oct 2022 - Le décodeur de cybersécurité
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics
Details Website 2022-10-06 15 Evolution of BazarCall Social Engineering Tactics