Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Video Capture

An adversary can leverage a computer's peripheral devices (e.g., integrated cameras or webcams) or applications (e.g., video call services) to capture video recordings for the purpose of gathering information. Images may also be captured from devices or applications, potentially in specified intervals, in lieu of video files.

Malware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture video or images. Video or image files may be written to disk and exfiltrated later. This technique differs from Screen Capture due to use of specific devices or applications for video recording rather than capturing the victim's screen.

In macOS, there are a few different malware samples that record the user's webcam such as FruitFly and Proton. [1]

ID: T1125
Sub-techniques:  No sub-techniques
Tactic: Collection
Platforms: Windows, macOS
Permissions Required: User
Data Sources: API monitoring, File monitoring, Process monitoring
CAPEC ID: CAPEC-634
Contributors: Praetorian
Version: 1.0
Created: 31 May 2017
Last Modified: 14 July 2020

Procedure Examples

Name Description
Agent Tesla

Agent Tesla can access the victim’s webcam and record video.[22][23]

Bandook

Bandook has modules that are capable of capturing from a victim's webcam.[20]

Cobian RAT

Cobian RAT has a feature to access the webcam on the victim’s machine.[21]

DarkComet

DarkComet can access the victim’s webcam to take pictures.[16][17]

Derusbi

Derusbi is capable of capturing video.[9]

Empire

Empire can capture webcam data on Windows and macOS systems.[6]

EvilGrab

EvilGrab has the capability to capture video from a victim machine.[12]

FIN7

FIN7 created a custom video recording capability that could be used to monitor operations in the victim's environment.[34][35]

Imminent Monitor

Imminent Monitor has a remote webcam monitoring capability.[7][8]

InvisiMole

InvisiMole can remotely activate the victim’s webcam to capture content.[13]

jRAT

jRAT has the capability to capture video from a webcam.[10][11]

Kazuar

Kazuar captures images from the webcam.[14]

Machete

Machete takes photos from the computer’s web camera.[28]

NanoCore

NanoCore can access the victim's webcam and capture data.[18][19]

njRAT

njRAT can access the victim's webcam.[26][27]

PoetRAT

PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts.[30]

Pupy

Pupy can access a connected webcam and capture pictures.[3]

QuasarRAT

QuasarRAT can perform webcam viewing.[4][5]

Remcos

Remcos can access a system’s webcam and take pictures.[2]

Revenge RAT

Revenge RAT has the ability to access the webcam.[24][25]

SDBot

SDBot has the ability to record video on a compromised host.[31][32]

Silence

Silence has been observed making videos of victims to observe bank employees day to day activities.[36][37]

T9000

T9000 uses the Skype API to record audio and video calls. It writes encrypted data to %APPDATA%\Intel\Skype.[15]

TajMahal

TajMahal has the ability to capture webcam video.[33]

ZxShell

ZxShell has a command to perform video device spying.[29]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection

Detection of this technique may be difficult due to the various APIs that may be used. Telemetry data regarding API use may not be useful depending on how a system is normally used, but may provide context to other potentially malicious activity occurring on a system.

Behavior that could indicate technique use include an unknown or unusual process accessing APIs associated with devices or software that interact with the video camera, recording devices, or recording software, and a process periodically writing files to disk that contain video or camera image data.

References

  1. Patrick Wardle. (n.d.). Retrieved March 20, 2018.
  2. Bacurio, F., Salvio, J. (2017, February 14). REMCOS: A New RAT In The Wild. Retrieved November 6, 2018.
  3. Nicolas Verdier. (n.d.). Retrieved January 29, 2018.
  4. MaxXor. (n.d.). QuasarRAT. Retrieved July 10, 2018.
  5. Meltzer, M, et al. (2018, June 07). Patchwork APT Group Targets US Think Tanks. Retrieved July 16, 2018.
  6. Schroeder, W., Warner, J., Nelson, M. (n.d.). Github PowerShellEmpire. Retrieved April 28, 2016.
  7. Unit 42. (2019, December 2). Imminent Monitor – a RAT Down Under. Retrieved May 5, 2020.
  8. QiAnXin Threat Intelligence Center. (2019, February 18). APT-C-36: Continuous Attacks Targeting Colombian Government Institutions and Corporations. Retrieved May 5, 2020.
  9. FireEye. (2018, March 16). Suspected Chinese Cyber Espionage Group (TEMP.Periscope) Targeting U.S. Engineering and Maritime Industries. Retrieved April 11, 2018.
  10. Sharma, R. (2018, August 15). Revamped jRAT Uses New Anti-Parsing Techniques. Retrieved September 21, 2018.
  11. Kamluk, V. & Gostev, A. (2016, February). Adwind - A Cross-Platform RAT. Retrieved April 23, 2019.
  12. PwC and BAE Systems. (2017, April). Operation Cloud Hopper: Technical Annex. Retrieved April 13, 2017.
  13. Hromcová, Z. (2018, June 07). InvisiMole: Surprisingly equipped spyware, undercover since 2013. Retrieved July 10, 2018.
  14. Levene, B, et al. (2017, May 03). Kazuar: Multiplatform Espionage Backdoor with API Access. Retrieved July 17, 2018.
  15. Grunzweig, J. and Miller-Osborn, J.. (2016, February 4). T9000: Advanced Modular Backdoor Uses Complex Anti-Analysis Techniques. Retrieved April 15, 2016.
  16. TrendMicro. (2014, September 03). DARKCOMET. Retrieved November 6, 2018.
  17. Kujawa, A. (2018, March 27). You dirty RAT! Part 1: DarkComet. Retrieved November 6, 2018.
  18. The DigiTrust Group. (2017, January 01). NanoCore Is Not Your Average RAT. Retrieved November 9, 2018.
  19. Kasza, A., Halfpop, T. (2016, February 09). NanoCoreRAT Behind an Increase in Tax-Themed Phishing E-mails. Retrieved November 9, 2018.
  1. Galperin, E., Et al.. (2016, August). I Got a Letter From the Government the Other Day.... Retrieved April 25, 2018.
  2. Yadav, A., et al. (2017, August 31). Cobian RAT – A backdoored RAT. Retrieved November 13, 2018.
  3. The DigiTrust Group. (2017, January 12). The Rise of Agent Tesla. Retrieved November 5, 2018.
  4. Brumaghin, E., et al. (2018, October 15). Old dog, new tricks - Analysing new RTF-based campaign distributing Agent Tesla, Loki with PyREbox. Retrieved November 5, 2018.
  5. Livelli, K, et al. (2018, November 12). Operation Shaheen. Retrieved May 1, 2019.
  6. Gannon, M. (2019, February 11). With Upgrades in Delivery and Support Infrastructure, Revenge RAT Malware is a Bigger Threat. Retrieved May 1, 2019.
  7. Fidelis Cybersecurity. (2013, June 28). Fidelis Threat Advisory #1009: "njRAT" Uncovered. Retrieved June 4, 2019.
  8. Scott-Railton, J., et al. (2016, August 2). Group5: Syria and the Iranian Connection. Retrieved September 26, 2016.
  9. Kaspersky Global Research and Analysis Team. (2014, August 20). El Machete. Retrieved September 13, 2019.
  10. Allievi, A., et al. (2014, October 28). Threat Spotlight: Group 72, Opening the ZxShell. Retrieved September 24, 2019.
  11. Mercer, W, et al. (2020, April 16). PoetRAT: Python RAT uses COVID-19 lures to target Azerbaijan public and private sectors. Retrieved April 27, 2020.
  12. Schwarz, D. et al. (2019, October 16). TA505 Distributes New SDBbot Remote Access Trojan with Get2 Downloader. Retrieved May 29, 2020.
  13. Frydrych, M. (2020, April 14). TA505 Continues to Infect Networks With SDBbot RAT. Retrieved May 29, 2020.
  14. GReAT. (2019, April 10). Project TajMahal – a sophisticated new APT framework. Retrieved October 14, 2019.
  15. Carr, N., et al. (2018, August 01). On the Hunt for FIN7: Pursuing an Enigmatic and Evasive Global Criminal Operation. Retrieved August 23, 2018.
  16. Department of Justice. (2018, August 01). HOW FIN7 ATTACKED AND STOLE DATA. Retrieved August 24, 2018.
  17. GReAT. (2017, November 1). Silence – a new Trojan attacking financial organizations. Retrieved May 24, 2019.
  18. Group-IB. (2018, September). Silence: Moving Into the Darkside. Retrieved May 5, 2020.