Adversaries may use screen capture to collect additional information about a target device, such as applications running in the foreground, user data, credentials, or other sensitive information. Applications running in the background can capture screenshots or videos of another application running in the foreground by using the Android MediaProjectionManager
(generally requires the device user to grant consent).[1][2] Background applications can also use Android accessibility services to capture screen contents being displayed by a foreground application.[3] An adversary with root access or Android Debug Bridge (adb) access could call the Android screencap
or screenrecord
commands.[4][5]
ID | Name | Description |
---|---|---|
S1095 | AhRat | |
S0422 | Anubis | |
S1079 | BOULDSPY | |
S1094 | BRATA | |
S0655 | BusyGasper |
BusyGasper can use its keylogger module to take screenshots of the area of the screen that the user tapped.[11] |
S0479 | DEFENSOR ID |
DEFENSOR ID can abuse the accessibility service to read any text displayed on the screen.[12] |
S1054 | Drinik |
Drinik can record the screen via the |
S0478 | EventBot |
EventBot can abuse Android’s accessibility service to capture data from installed applications.[14] |
S0405 | Exodus |
Exodus Two can take screenshots of any application in the foreground.[15] |
S0408 | FlexiSpy | |
S0423 | Ginp |
Ginp can capture device screenshots and stream them back to the C2.[17] |
S0551 | GoldenEagle |
GoldenEagle has taken screenshots.[18] |
S0421 | GolfSpy | |
S1077 | Hornbill |
Hornbill can take screenshots and can abuse accessibility services to scrape WhatsApp messages, contacts, and notifications.[20] |
S0485 | Mandrake | |
S0407 | Monokle |
Monokle can record the screen as the user unlocks the device and can take screenshots of any application in the foreground. Monokle can also abuse accessibility features to read the screen to capture data from a large number of popular applications.[3] |
S1062 | S.O.V.A. |
S.O.V.A. can take screenshots and abuse the Android Screen Cast feature to capture screen data.[22] |
S0324 | SpyDealer |
SpyDealer abuses Accessibility features to steal messages from popular apps such as WeChat, Skype, Viber, and QQ.[23] |
S1082 | Sunbird |
Sunbird can take screenshots and abuse accessibility services to scrape BlackBerry Messenger and WhatsApp messages, contacts, and notifications[20] |
S1069 | TangleBot |
TangleBot can record the screen and stream the data off the device.[24] |
S0558 | Tiktok Pro |
Tiktok Pro can take screenshots.[25] |
S0427 | TrickMo |
TrickMo can use the |
S0489 | WolfRAT |
WolfRAT can record the screen and take screenshots to capture messages from Line, Facebook Messenger, and WhatsApp.[27] |
ID | Mitigation | Description |
---|---|---|
M1013 | Application Developer Guidance |
Application developers can apply the |
M1012 | Enterprise Policy |
Enterprise policies should block access to the Android Debug Bridge (ADB) by preventing users from enabling USB debugging on Android devices unless specifically needed (e.g., if the device is used for application development). An EMM/MDM can use the Android |
M1011 | User Guidance |
Users should be advised not to grant consent for screen captures to occur unless expected. Users should avoid enabling USB debugging (Android Debug Bridge) unless explicitly required. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | API Calls |
Application vetting services can look for the use of the Android |
DS0042 | User Interface | System Settings |
The user can view a list of apps with accessibility service privileges in the device settings. |