CAPEC 634 Probe Audio and Video Peripherals

Stable Detailed Low Risk
Severity High

Description

The adversary exploits the target system's audio and video functionalities through malware or scheduled tasks. The goal is to capture sensitive information about the target for financial, personal, political, or other gains which is accomplished by collecting communication data between two parties via the use of peripheral devices (e.g. microphones and webcams) or applications with audio and video capabilities (e.g. Skype) on a system.

Mitigations

2

Consequences

Relationships

Related ATT&CK Techniques

2