Adversaries may attempt to perform screen capture of devices in the control system environment. Screenshots may be taken of workstations, HMIs, or other devices that display environment-relevant process, device, reporting, alarm, or related data. These device displays may reveal information regarding the ICS process, layout, control, and related schematics. In particular, an HMI can provide a lot of important industrial process information. [1] Analysis of screen captures may provide the adversary with an understanding of intended operations and interactions between critical devices.
| ID | Name | Description | 
|---|---|---|
| G1000 | ALLANITE | 
                                                             ALLANITE has been identified to collect and distribute screenshots of ICS systems such as HMIs. [2] [1]  | 
                                        
| G0064 | APT33 | 
                                                             APT33 utilize backdoors capable of capturing screenshots once installed on a system. [3][4]  | 
                                        
| ID | Asset | 
|---|---|
| A0002 | Human-Machine Interface (HMI) | 
| A0012 | Jump Host | 
| A0001 | Workstation | 
| ID | Mitigation | Description | 
|---|---|---|
| M0816 | Mitigation Limited or Not Effective | 
                                                                 Preventing screen capture on a device may require disabling various system calls supported by the operating systems (e.g., Microsoft WindowsGraphicsCaputer APIs), however, these may be needed for other critical applications.  | 
                                            
| ID | Name | Analytic ID | Analytic Description | 
|---|---|---|---|
| DET0751 | Detection of Screen Capture | AN1883 | 
                                 Monitor executed commands and arguments that may attempt to take screen captures of the desktop to gather information over the course of an operation.  |