An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.
Description
Mitigations
2
Consequences
Relationships
Related ATT&CK Techniques
2
Resources Required
1