Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. [1] Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
| ID | Name | Description |
|---|---|---|
| G1000 | ALLANITE |
ALLANITE has been identified to collect and distribute screenshots of ICS systems such as HMIs. [2] [1] |
| G0064 | APT33 |
APT33 utilize backdoors capable of capturing screenshots once installed on a system. [3][4] |
| ID | Asset |
|---|---|
| A0002 | Human-Machine Interface (HMI) |
| A0012 | Jump Host |
| A0001 | Workstation |
| ID | Mitigation | Description |
|---|---|---|
| M0816 | Mitigation Limited or Not Effective |
Preventing screen capture on a device may require disabling various system calls supported by the operating systems (e.g., Microsoft WindowsGraphicsCaputer APIs), however, these may be needed for other critical applications. |
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0751 | Detection of Screen Capture | AN1883 |
Monitor executed commands and arguments that may attempt to take screen captures of the desktop to gather information over the course of an operation. |