An adversary can leverage a computer's peripheral devices (e.g., integrated cameras or webcams) or applications (e.g., video call services) to capture video recordings for the purpose of gathering information. Images may also be captured from devices or applications, potentially in specified intervals, in lieu of video files.
Malware or scripts may be used to interact with the devices through an available API provided by the operating system or an application to capture video or images. Video or image files may be written to disk and exfiltrated later. This technique differs from Screen Capture due to use of specific devices or applications for video recording rather than capturing the victim's screen.
In macOS, there are a few different malware samples that record the user's webcam such as FruitFly and Proton. [1]
| ID | Name | Description |
|---|---|---|
| S0331 | Agent Tesla |
Agent Tesla can access the victim’s webcam and record video.[2][3] |
| S1087 | AsyncRAT | |
| S0234 | Bandook |
Bandook has modules that are capable of capturing video from a victim's webcam.[5] |
| S0660 | Clambling | |
| S0338 | Cobian RAT |
Cobian RAT has a feature to access the webcam on the victim’s machine.[8] |
| S0591 | ConnectWise |
ConnectWise can record video on remote hosts.[9] |
| S0115 | Crimson |
Crimson can capture webcam video on targeted systems.[10][11] |
| S0334 | DarkComet |
DarkComet can access the victim’s webcam to take pictures.[12][13] |
| S0021 | Derusbi | |
| G1003 | Ember Bear |
Ember Bear has exfiltrated images from compromised IP cameras.[15] |
| S0363 | Empire |
Empire can capture webcam data on Windows and macOS systems.[16] |
| S0152 | EvilGrab |
EvilGrab has the capability to capture video from a victim machine.[17] |
| G0046 | FIN7 |
FIN7 created a custom video recording capability that could be used to monitor operations in the victim's environment.[18][19] |
| S0434 | Imminent Monitor |
Imminent Monitor has a remote webcam monitoring capability.[20][21] |
| S0260 | InvisiMole |
InvisiMole can remotely activate the victim’s webcam to capture content.[22][23] |
| S0283 | jRAT |
jRAT has the capability to capture video from a webcam.[24][25] |
| S0265 | Kazuar | |
| S0409 | Machete |
Machete takes photos from the computer’s web camera.[27][28][29] |
| S0336 | NanoCore |
NanoCore can access the victim's webcam and capture data.[30][31] |
| S0385 | njRAT | |
| S0644 | ObliqueRAT |
ObliqueRAT can capture images from webcams on compromised hosts.[34] |
| S1050 | PcShare |
PcShare can capture camera video as part of its collection process.[35] |
| S0428 | PoetRAT |
PoetRAT has used a Python tool named Bewmac to record the webcam on compromised hosts.[36] |
| S0192 | Pupy |
Pupy can access a connected webcam and capture pictures.[37] |
| S0262 | QuasarRAT | |
| S1209 | Quick Assist |
Quick Assist allows for the remote administrator to view the interactive session of the running machine, including full screen activity.[40][41] |
| S0332 | Remcos | |
| S0379 | Revenge RAT |
Revenge RAT has the ability to access the webcam.[43][44] |
| S0461 | SDBbot |
SDBbot has the ability to record video on a compromised host.[45][46] |
| G0091 | Silence |
Silence has been observed making videos of victims to observe bank employees day to day activities.[47][48] |
| S0098 | T9000 |
T9000 uses the Skype API to record audio and video calls. It writes encrypted data to |
| S0467 | TajMahal | |
| S0670 | WarzoneRAT |
WarzoneRAT can access the webcam on a victim's machine.[51][52] |
| S0412 | ZxShell |
This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.
| ID | Name | Analytic ID | Analytic Description |
|---|---|---|---|
| DET0197 | Behavior-chain, platform-aware detection strategy for T1125 Video Capture | AN0568 |
A non-standard process (or script-hosted process) loads camera/video-capture libraries (e.g., avicap32.dll, mf.dll, ksproxy.ax), opens the Camera Frame Server/device, writes video/image artifacts (e.g., .mp4/.avi/.yuv) to unusual locations, and optionally initiates outbound transfer shortly after. |
| AN0569 |
A process opens/reads /dev/video* (V4L2), performs ioctl/read loops, writes large/continuous video artifacts to disk, and/or quickly establishes outbound connections for exfiltration. |
||
| AN0570 |
A non-whitelisted process receives TCC camera entitlement (kTCCServiceCamera), opens AppleCamera/AVFoundation device handles, writes .mov/.mp4 artifacts to unusual locations, and/or beacons/exfiltrates soon after. |