T1512 Video Capture
An adversary can leverage a device’s cameras to gather information by capturing video recordings. Images may also be captured, potentially in specified intervals, in lieu of video files.
Malware or scripts may interact with the device cameras through an available API provided by the operating system. Video or image files may be written to disk and exfiltrated later. This technique differs from Screen Capture due to use of the device’s cameras for video recording rather than capturing the victim’s screen.
In Android, an application must hold the android.permission.CAMERA permission to access the cameras. In iOS, applications must include the NSCameraUsageDescription key in the Info.plist file. In both cases, the user must grant permission to the requesting application to use the camera. If the device has been rooted or jailbroken, an adversary may be able to access the camera without knowledge of the user.
| Item | Value |
|---|---|
| ID | T1512 |
| Sub-techniques | |
| Tactics | TA0035 |
| Platforms | Android, iOS |
| Version | 2.1 |
| Created | 09 August 2019 |
| Last Modified | 24 October 2025 |
Procedure Examples
| ID | Name | Description |
|---|---|---|
| S1061 | AbstractEmu | AbstractEmu can grant itself camera permissions.25 |
| S0292 | AndroRAT | AndroRAT can take photos and videos using the device cameras.19 |
| S1079 | BOULDSPY | BOULDSPY can take photos using the device cameras.29 |
| S0655 | BusyGasper | BusyGasper can record from the device’s camera.23 |
| S0426 | Concipit1248 | Concipit1248 requests permissions to use the device camera.20 |
| S0425 | Corona Updates | Corona Updates can take pictures using the camera and can record MP4 files.20 |
| S1243 | DCHSpy | DCHSpy has captured photos from the device by taking control of the camera.12 |
| S0301 | Dendroid | Dendroid can take photos and record videos.39 |
| S0505 | Desert Scorpion | Desert Scorpion can record videos.22 |
| S0320 | DroidJack | DroidJack can capture video using device cameras.18 |
| S1092 | Escobar | Escobar can take photos using the device cameras.10 |
| S0405 | Exodus | Exodus Two can take pictures with the device cameras.17 |
| S1080 | Fakecalls | Fakecalls can request camera permissions.11 |
| S0408 | FlexiSpy | FlexiSpy can record video.2 |
| S0535 | Golden Cup | Golden Cup can take pictures with the camera.14 |
| S0551 | GoldenEagle | GoldenEagle has taken photos with the device camera.21 |
| S0421 | GolfSpy | GolfSpy can record video.4 |
| S0544 | HenBox | HenBox can access the device’s camera.26 |
| S1128 | HilalRAT | HilalRAT can activate a device’s camera.24 |
| S1077 | Hornbill | Hornbill can access a device’s camera and take photos.33 |
| S1185 | LightSpy | LightSpy has the ability to take one picture, continuous pictures or event-related pictures using the device’s camera.3536373834 For iOS devices, the default file type for pictures is in High Efficiency Image Format (HEIC); for Android devices, the default file type for pictures is in JPEG format. |
| S0407 | Monokle | Monokle can take photos and videos.9 |
| S0399 | Pallas | Pallas can take pictures with both the front and rear-facing cameras.40 |
| S0316 | Pegasus for Android | Pegasus for Android has the ability to take pictures using the device camera.28 |
| S1126 | Phenakite | Phenakite can capture pictures and videos.32 |
| S1241 | RatMilad | RatMilad has taken photos and videos using the device’s camera.27 |
| S0295 | RCSAndroid | RCSAndroid can capture photos using the front and back cameras.31 |
| S0549 | SilkBean | SilkBean can access the camera on the device.21 |
| S0327 | Skygofree | Skygofree can record video or capture photos when an infected device is in a specified location.15 |
| S1195 | SpyC23 | SpyC23 can capture pictures and videos.756 |
| S0324 | SpyDealer | SpyDealer can record video and take photos via front and rear cameras.42 |
| S0328 | Stealth Mango | Stealth Mango can record and take pictures using the front and back cameras.3 |
| S1082 | Sunbird | Sunbird can access a device’s camera and take photos.33 |
| S1069 | TangleBot | TangleBot can record video from the device camera.8 |
| S0558 | Tiktok Pro | Tiktok Pro can capture photos and videos from the device’s camera.41 |
| S0418 | ViceLeaker | ViceLeaker can take photos from both the front and back cameras.30 |
| S0506 | ViperRAT | ViperRAT can take photos with the device camera.16 |
| G0112 | Windshift | Windshift has included video recording in the malicious apps deployed as part of Operation BULL.43 |
| S0489 | WolfRAT | WolfRAT can take photos and videos.13 |
Mitigations
| ID | Mitigation | Description |
|---|---|---|
| M1006 | Use Recent OS Version | Android 9 and above restricts access to the mic, camera, and other device sensors from applications running in the background. iOS 14 and Android 12 introduced a visual indicator on the status bar (green dot) when an application is accessing the device’s camera.1 |
References
-
Android Developers. (, January). Android 9+ Privacy Changes . Retrieved August 27, 2019. ↩
-
Actis B. (2017, April 22). FlexSpy Application Analysis. Retrieved September 4, 2019. ↩
-
Lookout. (n.d.). Stealth Mango & Tangelo. Retrieved September 27, 2018. ↩
-
E. Xu, G. Guo. (2019, June 28). Mobile Cyberespionage Campaign ‘Bouncing Golf’ Affects Middle East. Retrieved January 27, 2020. ↩
-
Kohli, P. (2021, November 23). Android APT spyware, targeting Middle East victims, enhances evasiveness. Retrieved November 17, 2024. ↩
-
O’Donnell, L. (2020, September 30). Android Spyware Variant Snoops on WhatsApp, Telegram Messages. Retrieved January 10, 2025. ↩
-
Stefanko, L. (2020, September 30). APT‑C‑23 group evolves its Android spyware. Retrieved March 4, 2024. ↩
-
Felipe Naves, Andrew Conway, W. Stuart Jones, Adam McNeil . (2021, September 23). TangleBot: New Advanced SMS Malware Targets Mobile Users Across U.S. and Canada with COVID-19 Lures. Retrieved February 28, 2023. ↩
-
Bauer A., Kumar A., Hebeisen C., et al. (2019, July). Monokle: The Mobile Surveillance Tooling of the Special Technology Center. Retrieved September 4, 2019. ↩
-
B. Toulas. (2022, March 12). Android malware Escobar steals your Google Authenticator MFA codes. Retrieved September 28, 2023. ↩
-
Igor Golovin. (2022, April 11). Fakecalls: a talking Trojan. Retrieved July 21, 2023. ↩
-
Albrecht, J., Islamoglu, A. (2025, July 21). Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict . Retrieved September 19, 2025. ↩
-
W. Mercer, P. Rascagneres, V. Ventura. (2020, May 19). The wolf is back… . Retrieved July 20, 2020. ↩
-
R. Iarchy, E. Rynkowski. (2018, July 5). GoldenCup: New Cyber Threat Targeting World Cup Fans. Retrieved October 29, 2020. ↩
-
Nikita Buchka and Alexey Firsh. (2018, January 16). Skygofree: Following in the footsteps of HackingTeam. Retrieved September 24, 2018. ↩
-
M. Flossman. (2017, February 16). ViperRAT: The mobile APT targeting the Israeli Defense Force that should be on your radar. Retrieved September 11, 2020. ↩
-
Security Without Borders. (2019, March 29). Exodus: New Android Spyware Made in Italy. Retrieved November 17, 2024. ↩
-
Viral Gandhi. (2017, January 12). Super Mario Run Malware #2 – DroidJack RAT. Retrieved January 20, 2017. ↩
-
Dela Paz, R. (2016, October 21). BITTER: a targeted attack against Pakistan. Retrieved March 1, 2024. ↩
-
A. Kumar, K. Del Rosso, J. Albrecht, C. Hebeisen. (2020, June 1). Mobile APT Surveillance Campaigns Targeting Uyghurs - A collection of long-running Android tooling connected to a Chinese mAPT actor. Retrieved November 10, 2020. ↩↩
-
A. Blaich, M. Flossman. (2018, April 16). Lookout finds new surveillanceware in Google Play with ties to known threat actor targeting the Middle East. Retrieved September 11, 2020. ↩
-
Alexey Firsh. (2018, August 29). BusyGasper – the unfriendly spy. Retrieved October 1, 2021. ↩
-
Agranovich, D., et al. (2022, April). Adversarial Threat Report. Retrieved April 2, 2024. ↩
-
P Shunk, K Balaam. (2021, October 28). Rooting Malware Makes a Comeback: Lookout Discovers Global Campaign. Retrieved February 6, 2023. ↩
-
A. Hinchliffe, M. Harbison, J. Miller-Osborn, et al. (2018, March 13). HenBox: The Chickens Come Home to Roost. Retrieved September 9, 2019. ↩
-
Gupta, N. (2022, October 5). We Smell A RatMilad Android Spyware. Retrieved August 27, 2025. ↩
-
Mike Murray. (2017, April 3). Pegasus for Android: the other side of the story emerges. Retrieved April 16, 2017. ↩
-
Kyle Schmittle, Alemdar Islamoglu, Paul Shunk, Justin Albrecht. (2023, April 27). Lookout Discovers Android Spyware Tied to Iranian Police Targeting Minorities: BouldSpy. Retrieved July 21, 2023. ↩
-
GReAT. (2019, June 26). ViceLeaker Operation: mobile espionage targeting Middle East. Retrieved November 21, 2019. ↩
-
Veo Zhang. (2015, July 21). Hacking Team RCSAndroid Spying Tool Listens to Calls; Roots Devices to Get In. Retrieved December 22, 2016. ↩
-
Flossman, M., Scott, M. (2021, April). Technical Paper // Taking Action Against Arid Viper. Retrieved November 17, 2024. ↩
-
Apurva Kumar, Kristin Del Rosso. (2021, February 10). Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict. Retrieved June 9, 2023. ↩↩
-
Dmitry Bestuzhev. (2025, April 7). The Coordinated Kill Switch: LightSpy’s iOS Destructive Plugin Architecture Manages Device Disablement. Retrieved April 14, 2025. ↩
-
Firsh, A., et al. (2020, March 26). iOS exploit chain deploys LightSpy feature-rich malware. Retrieved January 13, 2025. ↩
-
Melikov, D. (2024, April 11). LightSpy Returns: Renewed Espionage Campaign Targets Southern Asia, Possibly India. Retrieved January 14, 2025. ↩
-
ThreatFabric. (2023, October 2). LightSpy mAPT Mobile Payment System Attack. Retrieved January 17, 2025. ↩
-
ThreatFabric. (2024, October 29). LightSpy: Implant for iOS. Retrieved January 30, 2025. ↩
-
Marc Rogers. (2014, March 6). Dendroid malware can take over your camera, record audio, and sneak into Google Play. Retrieved December 22, 2016. ↩
-
Blaich, A., et al. (2018, January 18). Dark Caracal: Cyber-espionage at a Global Scale. Retrieved April 11, 2018. ↩
-
S. Desai. (2020, September 8). TikTok Spyware. Retrieved January 5, 2021. ↩
-
Wenjun Hu, Cong Zheng and Zhi Xu. (2017, July 6). SpyDealer: Android Trojan Spying on More Than 40 Apps. Retrieved September 18, 2018. ↩
-
The BlackBerry Research & Intelligence Team. (2020, October). BAHAMUT: Hack-for-Hire Masters of Phishing, Fake News, and Fake Apps. Retrieved February 8, 2021. ↩