Video Capture (T1125)
“It’s your reaction to adversity, not adversity itself that determines how your life’s story will develop.”
Overview of Video Capture (T1125)
Video Capture (T1125) is a technique where adversaries use video recording to gather sensitive information from a victim's environment, utilizing the device's built-in webcam or connected cameras. This can be used for intelligence gathering, recording user activities, and capturing on-screen sensitive information.
Timeline & Notable Attacks
DarkHotel Campaign (2014)
Details: Targeted high-profile business travelers via hotel Wi-Fi networks with malware capable of video capture.
Attribution: Sophisticated APT group, possibly state-sponsored.
APT37 (Reaper) Operations (2017-2020)
Details: North Korean group using malware like ROKRAT to activate webcams and capture video.
Attribution: North Korean actors.
Operation Ghost (2019)
Details: Targeted Middle Eastern organizations with custom malware for video capture to spy on executives.
Attribution: Likely state-sponsored.
Varenyky Malware (2019)
Details: Targeted European users, capturing screen and webcam video, sometimes of sensitive interactions.
Attribution: Possibly cybercriminal.
Key Groups & Individuals
APT37 (Reaper)
Notable Members: Unknown; believed to operate under North Korean government.
Known Activities: Espionage, surveillance, cyber-attacks, mainly against South Korea and global targets.
DarkHotel
Notable Members: Not publicly identified; known for sophisticated spear-phishing targeting executives and government officials.
Technical Details of Attacks
Techniques Utilized in Video Capture
Common Tools: Custom modules, APIs like DirectShow (Windows) and Quartz (macOS).
Persistence Mechanisms: Combined with keylogging, RATs, screen capture for comprehensive surveillance.
Detection & Mitigation
Detection: Monitor for abnormal camera usage, unexpected process access to camera APIs, unusual video file access.
Mitigation: Webcam covers, endpoint security solutions to block camera access, maintain strict software and hardware security.
Public Resources & Further Reading
Windows Environments
Disable Camera Access via Group Policy:
Open “Group Policy Management Console” by typing
gpedit.msc
in the Run dialog.Navigate to
Computer Configuration > Administrative Templates > Windows Components > Camera
.Double-click "Allow Use Of Camera" and select “Disabled”.
Use Windows Privacy Settings:
Go to
Settings > Privacy > Camera
.Toggle off permission under "Allow apps to access your camera".
PowerShell Script to Disable Camera:
Open PowerShell as Administrator.
Run:
Set-Service -Name "usbvideo" -StartupType Disabled
macOS
Restrict Camera via Screen Time:
Open
System Preferences
and go toScreen Time
.Navigate to
Content & Privacy
, clickApps
, and toggle off the Camera.
Check for Unexpected Camera Usage:
Open Terminal and run:
lsof | grep "iSight"
Kill suspicious processes using
sudo kill -9 [PID]
.
Use the TCC Database:
Open Terminal.
Revoke camera access for all apps by running:
tccutil reset Camera
.
Linux
Disable Camera Module:
Open Terminal.
Run:
sudo modprobe -r uvcvideo
Blacklist Camera Modules:
Edit
/etc/modprobe.d/blacklist.conf
and add:blacklist uvcvideo
AppArmor/SELinux Profiles:
Ensure that AppArmor or SELinux profiles are configured to limit camera access.
Amazon AWS
Disable EC2 Instance Metadata Service:
Ensure Instance Metadata Service is not exploited by attackers.
Use IAM roles with the least privilege model.
CloudTrail Monitoring:
Enable CloudTrail to log management events and configure alerts for unusual activities.
Security Groups and NACLs:
Tighten Security Groups and NACLs to minimize the attack surface and disallow inbound traffic for video streaming.
Google Cloud Platform
VPC Flow Logs:
Enable VPC Flow Logs to monitor network traffic patterns that may indicate video streaming.
IAM Policy Best Practices:
Implement the least privilege principle and revoke unnecessary access to VM instances.
Stackdriver Monitoring:
Use Stackdriver to set up alerts for VM instance anomalies related to video capture activities.
Microsoft Azure
Azure Monitor and Log Analytics:
Use Azure Monitor to set up alerts for suspicious activities related to video capture.
Create Log Analytics queries to detect unusual processes or network traffic.
NSG and ASG Configurations:
Leverage Network Security Groups (NSGs) and Application Security Groups (ASGs) to control traffic.
Ensure rules restrict unnecessary access for video capturing.
Azure Security Center Recommendations:
Review and implement high-priority fixes to mitigate risks of potential video capture activities.