Dark Mode
Capec-648 Detail
Collect Data from Screen Capture
Detailed Software Likelihood: Medium Typical Severity: Medium
Parents: 150
An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.
Not present
| External ID | Source | Link | Description |
|---|---|---|---|
| CAPEC-648 | capec | https://capec.mitre.org/data/definitions/648.html | |
| CWE-267 | cwe | http://cwe.mitre.org/data/definitions/267.html | |
| T1113 | ATTACK | https://attack.mitre.org/wiki/Technique/T1113 | Screen Capture |
| T1513 | ATTACK | https://attack.mitre.org/wiki/Technique/T1513 | Screen Capture |
Not present
- The adversary must have obtained logical access to the system by some means (e.g., via obtained credentials or planting malware on the system).
- None: No specialized resources are required to execute this type of attack.
| Low |
|---|
| Once the adversary has logical access (which can potentially require high knowledge and skill level), the adversary needs only to leverage the relevant command for screen capture. |
| Confidentiality |
|---|
| Read Data (The adversary is able to capture potentially sensitive information and processes as they appear on the screen.) |
Not present