CAPEC-648: Collect Data from Screen Capture

An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks.

Severity
Medium
Likelihood
Medium
2
/ 100
low-risk
Active Threat 2/50 · Minimal
Exploit Availability 0/50 · Minimal