{ "id": "bundle--1fa5737d-ae59-42f4-b4be-84e0c9983849", "objects": [ { "created": "2018-07-31T00:00:00.000Z", "created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", "description": "An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.", "external_references": [ { "external_id": "CAPEC-648", "source_name": "capec", "url": "https://capec.mitre.org/data/definitions/648.html" }, { "external_id": "CWE-267", "source_name": "cwe", "url": "http://cwe.mitre.org/data/definitions/267.html" }, { "description": "Screen Capture", "external_id": "T1113", "source_name": "ATTACK", "url": "https://attack.mitre.org/wiki/Technique/T1113" }, { "description": "Screen Capture", "external_id": "T1513", "source_name": "ATTACK", "url": "https://attack.mitre.org/wiki/Technique/T1513" } ], "id": "attack-pattern--140142cc-28cb-4506-bce6-b44128b7b9a7", "modified": "2022-09-29T00:00:00.000Z", "name": "Collect Data from Screen Capture", "object_marking_refs": [ "marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" ], "spec_version": "2.1", "type": "attack-pattern", "x_capec_abstraction": "Detailed", "x_capec_child_of_refs": [ "attack-pattern--797f4b4e-371a-4d06-9e98-5cccb8a7ebc1" ], "x_capec_consequences": { "Confidentiality": [ "Read Data (The adversary is able to capture potentially sensitive information and processes as they appear on the screen.)" ] }, "x_capec_domains": [ "Software" ], "x_capec_likelihood_of_attack": "Medium", "x_capec_prerequisites": [ "The adversary must have obtained logical access to the system by some means (e.g., via obtained credentials or planting malware on the system)." ], "x_capec_resources_required": [ "None: No specialized resources are required to execute this type of attack." ], "x_capec_skills_required": { "Low": "Once the adversary has logical access (which can potentially require high knowledge and skill level), the adversary needs only to leverage the relevant command for screen capture." }, "x_capec_status": "Draft", "x_capec_typical_severity": "Medium", "x_capec_version": "3.9" } ], "type": "bundle" }