Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. [1] Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
ID | Name | Description |
---|---|---|
G1000 | ALLANITE |
ALLANITE has been identified to collect and distribute screenshots of ICS systems such as HMIs. [2] [1] |
G0064 | APT33 |
APT33 utilize backdoors capable of capturing screenshots once installed on a system. [3][4] |
ID | Asset |
---|---|
A0002 | Human-Machine Interface (HMI) |
A0012 | Jump Host |
A0001 | Workstation |
ID | Mitigation | Description |
---|---|---|
M0816 | Mitigation Limited or Not Effective |
Preventing screen capture on a device may require disabling various system calls supported by the operating systems (e.g., Microsoft WindowsGraphicsCaputer APIs), however, these may be needed for other critical applications. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0017 | Command | Command Execution |
Monitor executed commands and arguments that may attempt to take screen captures of the desktop to gather information over the course of an operation. |
DS0009 | Process | OS API Execution |
Monitoring for screen capture behavior will depend on the method used to obtain data from the operating system and write output files. Detection methods could include collecting information from unusual processes using API calls used to obtain image data, and monitoring for image files written to disk, such as CopyFromScreen, xwd, or screencapture.[5][6] The data may need to be correlated with other events to identify malicious activity, depending on the legitimacy of this behavior within a given network environment. |