Dark Mode

Settings

Capec-648 Detail

Collect Data from Screen Capture

Detailed Software Likelihood: Medium Typical Severity: Medium

Parents: 150

Description

An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.

Not present

External ID Source Link Description
CAPEC-648 capec https://capec.mitre.org/data/definitions/648.html
CWE-267 cwe http://cwe.mitre.org/data/definitions/267.html
T1113 ATTACK https://attack.mitre.org/wiki/Technique/T1113 Screen Capture
T1513 ATTACK https://attack.mitre.org/wiki/Technique/T1513 Screen Capture

Not present

  1. The adversary must have obtained logical access to the system by some means (e.g., via obtained credentials or planting malware on the system).
  1. None: No specialized resources are required to execute this type of attack.
Low
Once the adversary has logical access (which can potentially require high knowledge and skill level), the adversary needs only to leverage the relevant command for screen capture.
Confidentiality
Read Data (The adversary is able to capture potentially sensitive information and processes as they appear on the screen.)

Not present