CAPEC-634: Probe Audio and Video Peripherals

The adversary exploits the target system's audio and video functionalities through malware or scheduled tasks. The goal is to capture sensitive information about the target for financial, personal, political, or other gains which is accomplished by collecting communication data between two parties via the use of peripheral devices (e.g. microphones and webcams) or applications with audio and video capabilities (e.g. Skype) on a system.

Severity
High
Likelihood
Low
2
/ 100
low-risk
Active Threat 2/50 · Minimal
Exploit Availability 0/50 · Minimal