CAPEC-648

Collect Data from Screen Capture
Średni
Średni
Draft
2018-07-31
00h00 +00:00
2022-09-29
00h00 +00:00
Alert dla konkretnego CAPEC
Bądź na bieżąco z wszelkimi zmianami dotyczącymi konkretnego CAPEC.
Zarządzaj powiadomieniami

Opisy CAPEC

An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.

Informacje CAPEC

Wymagania wstępne

The adversary must have obtained logical access to the system by some means (e.g., via obtained credentials or planting malware on the system).

Wymagane umiejętności

Once the adversary has logical access (which can potentially require high knowledge and skill level), the adversary needs only to leverage the relevant command for screen capture.

Wymagane zasoby

None: No specialized resources are required to execute this type of attack.

Łagodzenie

Identify potentially malicious software that may have functionality to acquire screen captures, and audit and/or block it by using allowlist tools.
While screen capture is a legitimate and practical function, certain situations and context may require the disabling of this feature.

Powiązane słabości

CWE-ID Nazwa słabości

CWE-267

Privilege Defined With Unsafe Actions
A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.

Zgłoszenie

Nazwa Organizacja Data Data wydania
CAPEC Content Team 2018-07-31 +00:00

Modyfikacje

Nazwa Organizacja Data Komentarz
CAPEC Content Team The MITRE Corporation 2019-09-30 +00:00 Updated Related_Attack_Patterns
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated Mitigations, Related_Attack_Patterns
CAPEC Content Team The MITRE Corporation 2022-09-29 +00:00 Updated Taxonomy_Mappings