In this attack the attacker attempts to see the user screen by looking over the user’s shoulder.
This can occur close or even across the room.
The attacker is attempting to discover sensitive information, including usernames and passwords