CAPEC-634

Probe Audio and Video Peripherals
Low
High
Stable
2018-07-31
00h00 +00:00
2021-06-24
00h00 +00:00
Alerte pour un CAPEC
Stay informed of any changes for a specific CAPEC.
Notifications manage

Descriptions CAPEC

The adversary exploits the target system's audio and video functionalities through malware or scheduled tasks. The goal is to capture sensitive information about the target for financial, personal, political, or other gains which is accomplished by collecting communication data between two parties via the use of peripheral devices (e.g. microphones and webcams) or applications with audio and video capabilities (e.g. Skype) on a system.

Informations CAPEC

Prerequisites

Knowledge of the target device's or application’s vulnerabilities that can be capitalized on with malicious code. The adversary must be able to place the malicious code on the target device.

Skills Required

To deploy a hidden process or malware on the system to automatically collect audio and video data.

Mitigations

Prevent unknown code from executing on a system through the use of an allowlist policy.
Patch installed applications as soon as new updates become available.

Related Weaknesses

CWE-ID Weakness Name

CWE-267

Privilege Defined With Unsafe Actions
A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.

References

REF-653

What is Car Whisperer?
Amrita Mitra.
https://www.thesecuritybuddy.com/bluetooth-security/what-is-car-whisperer/

REF-654

What is Bluesnarfing?
https://www.finjanmobile.com/what-is-bluesnarfing/

Submission

Name Organization Date Date release
CAPEC Content Team The MITRE Corporation 2018-07-31 +00:00

Modifications

Name Organization Date Comment
CAPEC Content Team The MITRE Corporation 2020-07-30 +00:00 Updated Mitigations, Related_Attack_Patterns
CAPEC Content Team The MITRE Corporation 2021-06-24 +00:00 Updated Example_Instances, References