CAPEC 648 Collect Data from Screen Capture

Draft Detailed Medium Risk
Severity Medium

Description

An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.

Mitigations

2

Consequences

Relationships

Related ATT&CK Techniques

2

Resources Required

1